research centers


Search results: Found 1

Listing 1 - 1 of 1
Sort by

Article
Index seek technique for Querying Encrypted Databases

Authors: Sahab Dheyaa Mohammed --- Abdul Monem S. Rahma
Journal: Journal of Al-Qadisiyah for Computer Science and Mathematics مجلة القادسية لعلوم الحاسوب والرياضيات ISSN: 20740204 / 25213504 Year: 2019 Volume: 11 Issue: 3 Pages: Comp Page 59-68
Publisher: Al-Qadisiyah University جامعة القادسية

Loading...
Loading...
Abstract

Encryption is necessary to maintain data confidentiality and protect against outside attackers and internal administrators in the remote database (DB). However, the use of encryption makes it difficult to retrieve data from the remote database .where in traditional methods, is retrieved all data from the DB then, data are decrypted to obtain the specific data requested by the user. However, this process is time-consuming and does not maintain enough data security. In this paper, a technique was proposed to solve traditional method defects in encrypted DB systems. The proposed technique builds queries within the proxy server and retrieves only specified encrypted data from the remote DB without the requirement of retrieved all encryption data, then decrypted at the proxy site. Results showed that the proposed method took less time than conventional methods while maintaining data confidentiality.

Listing 1 - 1 of 1
Sort by
Narrow your search

Resource type

article (1)


Language

English (1)


Year
From To Submit

2019 (1)