Reference Hub11
SQL-Based Fuzzy Query Mechanism Over Encrypted Database

SQL-Based Fuzzy Query Mechanism Over Encrypted Database

Zheli Liu, Jingwei Li, Jin Li, Chunfu Jia, Jun Yang, Ke Yuan
Copyright: © 2014 |Volume: 10 |Issue: 4 |Pages: 17
ISSN: 1548-3924|EISSN: 1548-3932|EISBN13: 9781466653788|DOI: 10.4018/ijdwm.2014100104
Cite Article Cite Article

MLA

Liu, Zheli, et al. "SQL-Based Fuzzy Query Mechanism Over Encrypted Database." IJDWM vol.10, no.4 2014: pp.71-87. http://doi.org/10.4018/ijdwm.2014100104

APA

Liu, Z., Li, J., Li, J., Jia, C., Yang, J., & Yuan, K. (2014). SQL-Based Fuzzy Query Mechanism Over Encrypted Database. International Journal of Data Warehousing and Mining (IJDWM), 10(4), 71-87. http://doi.org/10.4018/ijdwm.2014100104

Chicago

Liu, Zheli, et al. "SQL-Based Fuzzy Query Mechanism Over Encrypted Database," International Journal of Data Warehousing and Mining (IJDWM) 10, no.4: 71-87. http://doi.org/10.4018/ijdwm.2014100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the development of cloud computing and big data, data privacy protection has become an urgent problem to solve. Data encryption is the most effective way to protect privacy; however, it will change the data format and result in: 1. database structure and application software will be changed; 2. structured query language (SQL) operations cannot work properly, especially in SQL-based fuzzy query. As a result, it is necessary to provide an SQL-based fuzzy query mechanism over encrypted databases, including traditional databases and cloud outsourced databases. This paper establishes a secure database system using format-preserving encryption (FPE) as the underlying primitive to protect the data privacy while not change the database structure. It further proposes a new SQL-based fuzzy query mechanism supporting directly query over encrypted data, which is constructed by FPE and universal hash function (UHF). The security of the proposed mechanism is analyzed as well. In the end, it makes extensive experiments on the system to demonstrate its practical performance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.