Research Repository

Executing SQL queries over encrypted character strings in the Database-As-Service model

Wu, ZongDa and Xu, Guandong and Yu, Zong and Yi, Xun and Cheng, EnHong and Zhang, Yanchun (2012) Executing SQL queries over encrypted character strings in the Database-As-Service model. Knowledge-Based Systems, 35. pp. 332-348. ISSN 0950-7051 (print) 1872-7409 (on-line)

Full text for this resource is not available from the Research Repository.

Abstract

Rapid advances in the networking technologies have prompted the emergence of the “software as service” model for enterprise computing, moreover, which is becoming one of the key industries quickly. “Database as service” model provides users power to store, modify and retrieve data from anywhere in the world, as long as they have access to the Internet, thus, being increasingly popular in current enterprise data management systems. However, this model introduces several challenges, an essential issue being how to implement SQL queries over encrypted data efficiently. To ensure data security, this model generally encrypts sensitive data at the trusted client’s site, before storing them into the non-trusted database service provider’s site, which, unfortunately, results in that SQL queries cannot be executed over the encrypted data immediately at the database service provider. In this paper we only focus on how to query encrypted character strings efficiently. Our strategy is that when storing character strings to the database service provider, we not only store the encrypted character strings themselves, but also generate some characteristic index values for these character strings, and store them in an additional field; and when querying the encrypted character strings, we first execute a coarse query over the characteristic index fields at the database service provider, in order to filter out most of tuples not related to the querying conditions, and then, we decrypt the rest tuples and execute a refined query over them again at the client site. In our strategy, we define an n-phase reachability matrix for a character string and use it as the characteristic index values, and based on such a definition, we present some theorems to split a SQL query into its server-side representation and client-side representation for partitioning the computation of a query across the client and the server and thus improving query performance. Finally, experimental results validate the functionality and effectiveness of our strategy.

Item Type: Article
Uncontrolled Keywords: ResPubID25451, data privacy, security, encryption, two-phase query, characteristic index, character string, mapping, queries, DAS
Subjects: FOR Classification > 0804 Data Format
FOR Classification > 0806 Information Systems
Faculty/School/Research Centre/Department > College of Science and Engineering
Depositing User: Yimin Zeng
Date Deposited: 14 Nov 2013 22:41
Last Modified: 20 Jan 2015 04:20
URI: http://vuir.vu.edu.au/id/eprint/22135
DOI: 10.1016/j.knosys.2012.05.009
ePrint Statistics: View download statistics for this item
Citations in Scopus: 2 - View on Scopus

Repository staff only

View Item View Item

Search Google Scholar