• Jun 03, 2019 News!Vol.9, No.5-Vol.10, No.3 have been indexed by EI (Inspec).   [Click]
  • Jun 03, 2019 News!Vol.11, No.3 has been published with online version.   [Click]
  • Mar 27, 2019 News!Vol.11, No.2 has been published with online version.   [Click]
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2015 Vol.7(2): 108-112 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2015.V7.940

Computational Analysis of Encrypted Database to Provide Confidentiality

Swetha Tera, S. Ramachandram, and P. Shankar Murthy
Abstract—Cloud computing, is network based model used to illustrate a variety of computing concepts that involves a large number of computers connected through a synchronized communicational network such as the Internet. Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the concept of Network Security can be applied over the cloud network, where several encryption algorithms are applied to provide integrity on the data. Such algorithms include Symmetric encryptions, Asymmetric encryptions, Hashing algorithms and Digital signatures. Even though these algorithms provide security, however these are not applied on query based data retrieval from databases where certain queries are used to invoke the data. Till to date many researchers proposed several models to provide security to the data in database and are not upto the mark. Since the operations are done in database which is located remotely, away from user, providing encryption on queries and data together will make an efficient approach. Such mechanisms like Homomorphic encryption, Order-preserving encryption are examined and a novel approach is defined to meet all security issues over a cloud termed as “CryptDB”.

Index Terms—Cloud computing, encryption mechanisms, homomorphic encryption, oder preserving encryption, CryptDB.

Swetha Tera, S. Ramachandram and P. Shankar Murthy are with the Computer Science & Engineering, Osmania University, India (e-mail:{swethareddy.07, schandram, murthy619}@gmail.com).


Cite: Swetha Tera, S. Ramachandram, and P. Shankar Murthy, "Computational Analysis of Encrypted Database to Provide Confidentiality," International Journal of Computer Theory and Engineering vol. 7, no. 2, pp. 108-112, 2015.

Copyright © 2008-2019. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@iacsitp.com