
A Comparison of the Query Execution Algorithms in Secure Database System
Author(s) -
Young-Dal Jang,
Ji Eun Kim
Publication year - 2016
Publication title -
international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.277
H-Index - 22
ISSN - 2088-8708
DOI - 10.11591/ijece.v6i1.pp337-343
Subject(s) - computer science , encryption , database , database security , view , tuple , bloom filter , database tuning , database testing , outsourcing , database design , data mining , algorithm , computer security , mathematics , discrete mathematics , political science , law
In accordance with the database management, DAS(Database as Service) model is one solution for outsourcing. However, we need some data protection mechanisms in order to maintain the database security The most effective algorithm to secure databases from the security threat of third party attackers is to encrypt the sensitive data within the database. However, once we encrypt the sensitive data, we have difficulties in queries execution on the encrypted database. In this paper, we focus on the search process on the encrypted database. We proposed the selective tuple encryption method using Bloom Filter which could tell us the existence of the data. Finally, we compare the search performance between the proposed method and the other encryption methods we know.