1. Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service Era
- Author
-
Namje Park and Jun Wook Lee
- Subjects
Database ,Range query (data structures) ,Computer science ,business.industry ,Big data ,Client-side encryption ,Cloud computing ,Hash-based message authentication code ,computer.software_genre ,Encryption ,Filesystem-level encryption ,On-the-fly encryption ,business ,computer - Abstract
Security and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small scale static (as opposed to streaming) data, are inadequate. In this paper, we proposed Bucket ID Transformation that is a new encryption mechanism and the scheme can range search without order-preserving. Bucket ID Transformation is performed by recursive HMAC as many as a value of Bucket ID. As a future desk, we plan to carry out simulated experiments for performance evaluation and compare the results, and design and verify a provably secure encryption mechanism.
- Published
- 2012
- Full Text
- View/download PDF