Optimizing Selection Processing for Encrypted Database using Past Result Knowledge Base

نویسندگان

  • Wai Kit Wong
  • Kwok-Wai Wong
  • Ho-Yin Yue
چکیده

Data confidentiality is concerned in database-as-a-service (DBaaS) model. The cloud server should not have access to user’s plain data. Data is encrypted before they are stored in cloud database. Query computation over encrypted data by the server is not straight-forward. Many research works have been done on this problem. A common goal is to let the server obtain the selection result without leaking information about plain data. In existing solutions, the selection result is simply dumped by the server after the query answer is returned. Our idea is to make use of such past results of selections to improve processing speed for new queries. We developed an indexing mechanism called past result knowledge base (PRKB) to improve processing speed of selection with comparison predicate(s) in EDBMS. All operations related to PRKB are done by the server only. In our empirical studies, PRKB can reduce processing cost by orders of magnitudes compared to the case PRKB is not used.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

A Novel Method for Selecting the Supplier Based on Association Rule Mining

One of important problems in supply chains management is supplier selection. In a company, there are massive data from various departments so that extracting knowledge from the company’s data is too complicated. Many researchers have solved this problem by some methods like fuzzy set theory, goal programming, multi objective programming, the liner programming, mixed integer programming, analyti...

متن کامل

StealthDB: a Scalable Encrypted Database with Full SQL Query Support

Encrypted database systems provide a great method for protecting sensitive data in untrusted infrastructures. These systems are built using either specialpurpose cryptographic algorithms that support operations over encrypted data, or by leveraging trusted computing co-processors. Strong cryptographic algorithms usually result in high performance overheads (e.g., public-key encryptions, garbled...

متن کامل

Is Homomorphic Encryption the Holy Grail for Database Queries on Encrypted Data?

Homomorphic encryption has been used for supporting simple aggregations, numeric calculations on encrypted data as well as for private information retrieval. Recently, theoretical breakthroughs on homomorphic encryption resulted in fully homomorphic encryption, which is able to compute arbitrary functions on encrypted data. As a result, homomorphic encryption is generally believed to be the hol...

متن کامل

A Database for Automatic Persian Speech Emotion Recognition: Collection, Processing and Evaluation

Abstract   Recent developments in robotics automation have motivated researchers to improve the efficiency of interactive systems by making a natural man-machine interaction. Since speech is the most popular method of communication, recognizing human emotions from speech signal becomes a challenging research topic known as Speech Emotion Recognition (SER). In this study, we propose a Persian em...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018