Obiniyi et al., 2015 - Google Patents
Balancing Query Performance and Security on Relational Cloud Database: An ArchitectureObiniyi et al., 2015
View PDF- Document ID
- 264599375985872510
- Author
- Obiniyi A
- Dzer R
- Abdullahi S
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
Data outsourcing has become a trend in the information technology industry because it offers scalability to the enormous amount of digital content stored and generated on a daily basis by individuals and corporations. Of significance, is the security and privacy of the data …
- 238000000034 method 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11782911B1 (en) | Systems and methods for cryptographically-secure queries using filters generated by multiple parties | |
| Guo et al. | Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption | |
| Popa et al. | CryptDB: processing queries on an encrypted database | |
| US7519835B2 (en) | Encrypted table indexes and searching encrypted tables | |
| US9087212B2 (en) | Methods and apparatus for securing a database | |
| Zhang et al. | Inference attack-resistant e-healthcare cloud system with fine-grained access control | |
| CN106934301B (en) | A secure outsourced data processing method for relational databases supporting ciphertext data operations | |
| Wu et al. | An effective approach for the protection of privacy text data in the CloudDB | |
| Rauthan et al. | Privacy and Security of User's Sensitive Data: A Viable Analysis. | |
| Arora et al. | Mechanism for securing cloud based data warehouse schema | |
| Sun et al. | SQL queries over encrypted databases: a survey | |
| Sareen et al. | Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme | |
| Yao et al. | Efficient and privacy-preserving search in multi-source personal health record clouds | |
| Albadri et al. | A classification method for identifying confidential data to enhance efficiency of query processing over cloud | |
| Obiniyi et al. | Balancing Query Performance and Security on Relational Cloud Database: An Architecture | |
| Nasereddin et al. | An object oriented programming on encrypted database system (CryptDB) | |
| Jang et al. | A Comparison of the Query Execution Algorithms in Secure Database System. | |
| Song et al. | Efficient privacy‐preserved data query over ciphertext in cloud computing | |
| Jiang et al. | Protecting source privacy in federated search | |
| Pleskach et al. | Mechanisms for Encrypting Big Unstructured Data: Technical and Legal Aspects | |
| Wong et al. | Non-order-preserving index for encrypted database management system | |
| Alexander et al. | Privacy-aware set-valued data publishing on cloud for personal healthcare records | |
| Geng et al. | SCORD: shuffling column-oriented relational database to enhance security | |
| Kim et al. | A performance test of query operation on encrypted database | |
| Zhao et al. | Obric: Oblivious Keyword Search in Hyperledger Fabric Platform |