Inicio  /  Applied Sciences  /  Vol: 13 Par: 20 (2023)  /  Artículo
ARTÍCULO
TITULO

Technique for Searching Data in a Cryptographically Protected SQL Database

Vitalii Yesin    
Mikolaj Karpinski    
Maryna Yesina    
Vladyslav Vilihura    
Ruslan Kozak and Ruslan Shevchuk    

Resumen

The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms that provide the ability to effectively use encryption to protect data. However, the use of traditional encryption methods faces a problem. Namely, traditional encryption, by making it impossible for insiders and outsiders to access data without knowing the keys, excludes the possibility of searching. This paper presents a solution that provides a strong level of confidentiality when searching, inserting, modifying, and deleting the required sensitive data in a remote database whose data are encrypted. The proposed SQL query processing technique allows the DBMS server to perform search functions over encrypted data in the same way as in an unencrypted database. This is achieved through the organization of automatic decryption by specially developed secure software of the corresponding data required for search, without the possibility of viewing these data itself. At that, we guarantee the integrity of the stored procedures used and special tables that store encrypted modules of special software and decryption keys, the relevance and completeness of the results returned to the application. The results of the analysis of the feasibility and effectiveness of the proposed solution show that the proper privacy of the stored data can be achieved at a reasonable overhead.

 Artículos similares

       
 
Tao Chen, Xingru Qu, Zhao Zhang and Xiao Liang    
In this article, a distributed cooperative path-maneuvering control approach is developed for the region-searching of multiple autonomous underwater vehicles under both dynamic uncertainties and ocean currents. Salient contributions are as follows: (1) b... ver más

 
Lixin Wang, Kun Yang, Peng Zhao and Ting Yue    
For aircraft employing the fly-by-wire technique, the closed-loop dynamic characteristics are determined by both the configuration design and the flight control system. As the capacity of the control system has certain limitations, the configuration para... ver más
Revista: Aerospace

 
Doddy Prayogo, Min-Yuan Cheng, Yu-Wei Wu, A. A. N. Perwira Redi, Vincent F. Yu, Satria Fadil Persada and Reny Nadlifatin    
Symbiotic organisms search (SOS) is a promising metaheuristic algorithm that has been studied recently by numerous researchers due to its capability to solve various hard and complex optimization problems. SOS is a powerful optimization technique that mi... ver más
Revista: Algorithms

 
Md. Saiful Islam, Emam Hossain, Abdur Rahman, Mohammad Shahadat Hossain and Karl Andersson    
In recent years, the foreign exchange (FOREX) market has attracted quite a lot of scrutiny from researchers all over the world. Due to its vulnerable characteristics, different types of research have been conducted to accomplish the task of predicting fu... ver más
Revista: Algorithms

 
Eduardo Becker Groth, Thomas Gabriel Rosauro Clarke, Guilherme Schumacher da Silva, Ignacio Iturrioz and Giuseppe Lacidogna    
The use of mechanic waves for assessing structural integrity is a well-known non-destructive technique (NDT). The ultrasound applied in the guided wave in particular requires significant effort in order to understand the complexities of the propagation s... ver más
Revista: Applied Sciences