Publication Type : Conference Paper
Publisher : Proceedings - 2016 15th International Conference on Information Technology, ICIT 2016, Institute of Electrical and Electronics Engineers Inc
Source : Proceedings - 2016 15th International Conference on Information Technology, ICIT 2016, Institute of Electrical and Electronics Engineers Inc., p.61-68 (2017)
Url : https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027716968&doi=10.1109%2fICIT.2016.43&partnerID=40&md5=b091a695f1715cb50b32e483270b5865
ISBN : 9781509035847
Keywords : Cryptography, Encryption algorithms, Ho-momorphic encryptions, Homomorphic Encryption Schemes, Inference attacks, Order preserving, Query processing, Security, Statistical database, Tree
Campus : Amritapuri
School : Department of Computer Science and Engineering, School of Engineering
Department : Computer Science
Verified : No
Year : 2016
Abstract : Encryption of sensitive data is commonly used to preserve confidentiality and integrity. The problem with encrypting data is we have to decrypt it for applying operations on files such as altering a word document or querying a statistical database containing financial data. Decrypting the data will leave it vulnerable. If we want to perform conditional based search queries in an encrypted data entire data should be decrypted to perform it, unless an order preserving scheme is used. There is no homomorphic encryption scheme which will allow us to perform conditional based queries without decrypting the entire data. In mathematical term homomorphic describes the changeover of one data set into another upholding the association between elements in both sets. Order Preserving Encryption (OPE) schemes are used extensively used in cryptography because of their usage in database design. But there is a chances of inference attack in case of OPE. In this paper we had proposed and implemented a technique which will allow to perform conditional based search queries in the data encrypted using any encryption algorithm with log(n) decryption, thereby reducing complexity. © 2016 IEEE.
Cite this Research Publication : B. Venugopal and Sarath, G., “A novel approach for preserving numerical ordering in encrypted data”, in Proceedings - 2016 15th International Conference on Information Technology, ICIT 2016, 2017, pp. 61-68.