Abstract
Database encryption is a process in which the data stored in the database are converted from plaintext (PT) to ciphertext (CT). The original data can be retrieved from the ciphertext with the help of a predefined key and a decryption scheme. This way, only the appropriate authority that has the key can access the data. Thus, encrypted databases help ensure data confidentiality and avoid data leaks. In this paper, we will describe a modification to the Secure K-Nearest Neighbours (SkNN) [3] technique to construct an encrypted database system. We briefly discuss some of the existing encryption models and the principles involved in their construction and look at some of the issues that plague these models. The motivation behind this paper is to devise a method that allows for strong database encryption, while at the same time facilitating efficient search over the encrypted data. In order to achieve this, we suggest an approach which combines RSA with the SkNN scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Poddar, R., Popa, R., Boelter, T.: Arx: a strongly encrypted database system. IACR Cryptology ePrint Archive, p. 20 (2016)
Khatib, K., Guennoun, M., Gahi, Y.: A secure database system using homomorphic encryption schemes. In: The Third International Conference on Advances in Databases, Knowledge, and Data Applications, p. 5 (2011)
Wang, Q., Sun, X., Wang, X., Xia, Z.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2016)
Garay, J., Curtmola, R., Ostrovsky, R., Kamara, S.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88 (2006)
Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. Cryptology ePrint Archive, p. 16 (2014)
Perrig, A., Song, D., Wagner, D.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, SP 2000, p. 12 (2000)
Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 54–68. Springer, Heidelberg (2005). https://doi.org/10.1007/11535706_5
Athanasios, V., Mazhar, A., Samee, K.: Security in cloud computing: opportunities and challenges. Elsevier Inf. Sci. 305, 357–383 (2015)
Daniel, M., Eduardo, F., Haralambos, M., Oscar, R.: Empirical evaluation of a cloud computing information security governance framework. Elsevier Inf. Softw. Technol. 58, 44–57 (2015)
Kaiping, X., Jianan, H., Nenghai, Y., Peilin, H., Shaohua, L., Yingjie, X.: Two-cloud secure database for numeric-related SQL range queries with privacy preserving. IEEE Trans. Inf. Forensics Secur. 12, 1596–1608 (2017)
Bony, C., Paul, C., Peter, C., Yu-Kwong, K.: CypherDB: a novel architecture for outsourcing secure database processing. IEEE Trans. Cloud Comput. 14 (2015)
Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. In: 2014 IEEE 30th International Conference on Data Engineering (ICDE), pp. 664–675. IEEE (2014)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85–100. ACM (2011)
Acknowledgment
This work is partially supported by Early Career Research Award from Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Govt. of India, New Delhi, India (Project Number: ECR/2015/000256).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Deshpande, V., Das, D. (2019). Efficient Searching Over Encrypted Database: Methodology and Algorithms. In: Fahrnberger, G., Gopinathan, S., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2019. Lecture Notes in Computer Science(), vol 11319. Springer, Cham. https://doi.org/10.1007/978-3-030-05366-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-05366-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-05365-9
Online ISBN: 978-3-030-05366-6
eBook Packages: Computer ScienceComputer Science (R0)