Open Access Open Access  Restricted Access Subscription Access

Query Processing on Encoded Data using Bitmap

Sarthak Bakshi, Shreyas Chavan, Anuj Kumar, Shyam Hargaonkar

Abstract


As database has been highlighted, data encryption schemes are required to protect database from unauthorized access so, to efficiently manage the large amount of encrypted data distributed index is needed with query processing scheme over it. The schemes that are present or exist for processing the query over encrypted data can support limited types of queries. Also data which is in encrypted format need to be decrypted before performing queries as such schemes does not support operations between different columns due to the use of different type of encryption keys (Asymmetric Cryptography). To solve this problem, we propose the Encoded technique which uses bitmap to convert our dataset into encoded dataset and performs query processing on encoded data and also this proposed technique guarantees data privacy preservation and performance improvement for the various types of queries. In addition, it protects our private information from third party to whom we are outsourcing our data. In short we are going to process a query over the encoded data without data decoding. The proposed query processing scheme using bitmap provide both high query performance and accuracy while preserving the data privacy from unauthorized access and also from third party.

Full Text:

PDF

References


Lil Marıa Rodrıguez-Henrıquez and Debrup Chakraborty, Using Bitmaps for Executing Range Queries in Encrypted Databases of In IEEE Symposium on Security and Privacy, pages 463–477. IEEE Computer Society.

Osama M Ben Omran, Brajendra Panda, Facilitating Secure Query Processing on Encrypted Databases of IEEE International Conference on Smart Cloud

Yuhao Wen, Han Wang, Zhen Chen, Junwei Cao, Guodong Peng MASC: A Bitmap Index Encoding Algorithm for Fast Data Retrieval of IEEE ICC 2016 SAC Data Storage

Bitmap-based Distributed Index Structure and Encrypted Query Processing Schemes for Outsourcing Mobile Sensitive Data Hyunjo Lee, Hyeong-Jin Kim, Jae-Woo Chang* Dept. of Computer Engineering Chonbuk National University, Republic of Korea {o2near, yeon_hui4,jwchang}@jbnu.ac.kr *Corresponding author Hyeong-Il Kim The 1st Missile Systems PMO Agency for Defense Development, Republic of Korea hikim@add.re.kr

https://www.quora.com/in/Where-are-cryptographic-algorithms-used-in-our-daily-applications


Refbacks

  • There are currently no refbacks.