• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Nov 09, 2017 News!Vol.9, No.5 has been published with online version. 16 peer reviewed articles from 11 specific areas are published in this issue.   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2015 Vol.7(2): 108-112 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2015.V7.940

Computational Analysis of Encrypted Database to Provide Confidentiality

Swetha Tera, S. Ramachandram, and P. Shankar Murthy
Abstract—Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the concept of Network Security can be applied over the cloud network, where several encryption algorithms are applied to provide integrity on the data. Such algorithms include Symmetric encryptions, Asymmetric encryptions, Hashing algorithms and Digital signatures. Even though these algorithms provide security, however these are not applied on query based data retrieval from databases where certain queries are used to invoke the data. Till to date many researchers proposed several models to provide security to the data in database and are not upto the mark. Since the operations are done in database which is located remotely, away from user, providing encryption on queries and data together will make an efficient approach. Such mechanisms like Homomorphic encryption, Order-preserving encryption are examined and a novel approach is defined to meet all security issues over a cloud termed as “CryptDB”.

Index Terms—Cloud computing, encryption mechanisms, homomorphic encryption, oder preserving encryption, CryptDB.

Swetha Tera, S. Ramachandram and P. Shankar Murthy are with the Computer Science & Engineering, Osmania University, India (e-mail:{swethareddy.07, schandram, murthy619}@gmail.com).

[PDF]

Cite: Swetha Tera, S. Ramachandram, and P. Shankar Murthy, "Computational Analysis of Encrypted Database to Provide Confidentiality," International Journal of Computer Theory and Engineering vol. 7, no. 2, pp. 108-112, 2015.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com