Back close

Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets

Publication Type : Journal Article

Thematic Areas : TIFAC-CORE in Cyber Security

Publisher : International Journal of Control Theory and Applications

Source : International Journal of Control Theory and Applications, Volume 10, Issue 19 (2017)

Campus : Coimbatore

Center : TIFAC CORE in Cyber Security

Department : cyber Security

Verified : No

Year : 2017

Abstract : Database security techniques are available widely. Among those techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and an approach for searching and retrieval efficiencies that are implemented. In this paper we analyze the database queries and the data properties and propose a suitable mechanism to query the encrypted database. We proposed and analyzed the new database encryption algorithm using the Bloom Filter with the bucket index method. Finally, we demonstrated the superiority of the proposed algorithm through several experiments that should be useful for database encryption related research and application activities.

Cite this Research Publication : Santhya R, “Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets”, International Journal of Control Theory and Applications, vol. 10, no. 19, 2017.

Admissions Apply Now