Abstract
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree. Experiment results show that our scheme outperforms other method in encryption and query speed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proc. of the ACM SIGMOD Conf. on Management of Data, Paris, France, pp. 563–574 (2004)
Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS), pp. 93–102 (2003)
Damiani, E., Vimercati, S.D.C., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a Storage Mechanism for Untrusted DBMSs. In: Proc. of the International IEEE Security in Storage Workshop, p. 38 (2003)
Hacigümüs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of the 18th International Conference on Data Engineering, p. 29 (2002)
Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo Random Number Generator. SIAM Journal on Computing Archive 15(2), 364–383 (1986)
Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. In: Proc. of the ACM SIGMOD Conf. on Management of Data, Madison,Wisconsin, pp. 216–227 (2002)
Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A Framework for Efficient Storage Security in RDBMS. In: Hwang, J., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 147–164. Springer, Heidelberg (2004)
Chung, S.S., Ozsoyoglu, G.: Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. In: 22nd International Conference on Data Engineering Workshops (ICDEW 2006), p. 98 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, YJ., Cha, JS., Kang, JM. (2011). A Study for Method of Construct Encryption Scheme for Supporting Range Query Based on Bucket ID Transformation about Sensor Applications. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)