Cryptograph Index Technology Based on Bucket Partitioning and B+ Tree

Article Preview

Abstract:

Database encryption is the last defense to ensure data security, resolving the problem of insecurity caused by unencrypted data directly stored in database. At the same time, Database encryption has brought a new troubleencryption makes query efficiency become obviously slow. Cryptograph index is an effective method. In the DAS(Database as a service) model, a method based on bucket partitioning and B+ tree, which utilizes B+ tree to sort data in the bucket and improves the efficiency due to reduce the amount of processing data, is put forth in this paper. Finally, the paper has made an analysis on its performance.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

608-614

Citation:

Online since:

August 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R. L. Rivest, L. M. Adleman, and M. Dertouzous. On data banks and privacy Homomorphisms[J]. Foundations of Secure Computations, pp: 169-179. (1978).

Google Scholar

[2] R. Agrawal, R. Srikant, Yirong xu. Order-Preserving Encryption for Numeric Data[C]. Proceedings of the ACM SIGMOD, Paris, France, pp: 563-574. (2004).

DOI: 10.1145/1007568.1007632

Google Scholar

[3] Dai Yqi, Shang Jie, Su Zhongmin. Quick Index on Encrypted Database[J]. Journal of Tsinghua University, pp: 24 -27. 1997 (4).

Google Scholar

[4] Cui Guohua, Tang Xueming. Implementation Research on Encryption Mechanism[J]. Cryptograp hand Information, pp: 84-90. 2000(2).

Google Scholar

[5] Cui Guohua, Tang Xueming. More Secure Encryption Mechanism in Database System[J]. Journal of Huazhong University of Science and Technology, pp: 29-31, 2000(7).

Google Scholar

[6] Yu Xiangxuan,Liuwei. Ciphertext Index Mechanism for database System[J]. Journal of Huazhong University of Science and Technology (Nature Science), pp: 218-221, (2002).

Google Scholar

[7] H. Hacigumus, B. Lyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database–Server–Procider–Model. Technical Report TR-DB-02-02, Database Research Group at University of California, Irvine, (2002).

DOI: 10.1145/2213836.2370917

Google Scholar

[8] B. Hore, S. Mehtotra, G. Tsudik. A Privacy–Preserving Index for Range Queries[C]. Proceedings of the 30th VLDB conference. Toronto, Canada, pp: 223-235, (2004).

DOI: 10.1016/b978-012088469-8.50064-4

Google Scholar