Index seek technique for Querying Encrypted Databases

Authors

  • Sahab Dheyaa Mohammed University of Information Technology and Communications, Baghdad, Iraq
  • Abdul Monem S. Rahma Department of Computer Science, University of Technology, Baghdad, Iraq

DOI:

https://doi.org/10.29304/jqcm.2019.11.3.607

Keywords:

Encryption database,, Encoding data,, Indexing techniques,, Index field generation,, query processing,

Abstract

Encryption is necessary to maintain data confidentiality and protect against outside attackers and internal administrators in the remote database (DB). However, the use of encryption makes it difficult to retrieve data from the remote database .where in traditional methods, is retrieved all data from the DB then, data are decrypted to obtain the specific data requested by the user. However, this process is time-consuming and does not maintain enough data security. In this paper, a technique was proposed to solve traditional method defects in encrypted DB systems. The proposed technique builds queries within the proxy server and retrieves only specified encrypted data from the remote DB without the requirement of retrieved all encryption data, then decrypted at the proxy site. Results showed that the proposed method took less time than conventional methods while maintaining data confidentiality.

Downloads

Download data is not yet available.

Downloads

Published

2019-09-09

How to Cite

Mohammed, S. D., & Rahma, A. M. S. (2019). Index seek technique for Querying Encrypted Databases. Journal of Al-Qadisiyah for Computer Science and Mathematics, 11(3), Comp Page 59–68. https://doi.org/10.29304/jqcm.2019.11.3.607

Issue

Section

Computer Articles