General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2015 Vol.7(2): 108-112 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2015.V7.940

Computational Analysis of Encrypted Database to Provide Confidentiality

Swetha Tera, S. Ramachandram, and P. Shankar Murthy

Abstract—Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the concept of Network Security can be applied over the cloud network, where several encryption algorithms are applied to provide integrity on the data. Such algorithms include Symmetric encryptions, Asymmetric encryptions, Hashing algorithms and Digital signatures. Even though these algorithms provide security, however these are not applied on query based data retrieval from databases where certain queries are used to invoke the data. Till to date many researchers proposed several models to provide security to the data in database and are not upto the mark. Since the operations are done in database which is located remotely, away from user, providing encryption on queries and data together will make an efficient approach. Such mechanisms like Homomorphic encryption, Order-preserving encryption are examined and a novel approach is defined to meet all security issues over a cloud termed as “CryptDB”.

Index Terms—Cloud computing, encryption mechanisms, homomorphic encryption, oder preserving encryption, CryptDB.

Swetha Tera, S. Ramachandram and P. Shankar Murthy are with the Computer Science & Engineering, Osmania University, India (e-mail:{swethareddy.07, schandram, murthy619}@gmail.com).

[PDF]

Cite: Swetha Tera, S. Ramachandram, and P. Shankar Murthy, "Computational Analysis of Encrypted Database to Provide Confidentiality," International Journal of Computer Theory and Engineering vol. 7, no. 2, pp. 108-112, 2015.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.