Publication Type : Journal Article
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : International Journal of Control Theory and Applications
Source : International Journal of Control Theory and Applications, Volume 10, Issue 19 (2017)
Campus : Coimbatore
Center : TIFAC CORE in Cyber Security
Department : cyber Security
Verified : No
Year : 2017
Abstract : Database security techniques are available widely. Among those techniques, the encryption method is a well-certified and established technology for protecting sensitive data. However, once encrypted, the data can no longer be easily queried. The performance of the database depends on how to encrypt the sensitive data, and an approach for searching and retrieval efficiencies that are implemented. In this paper we analyze the database queries and the data properties and propose a suitable mechanism to query the encrypted database. We proposed and analyzed the new database encryption algorithm using the Bloom Filter with the bucket index method. Finally, we demonstrated the superiority of the proposed algorithm through several experiments that should be useful for database encryption related research and application activities.
Cite this Research Publication : Santhya R, “Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets”, International Journal of Control Theory and Applications, vol. 10, no. 19, 2017.