首页> 外文OA文献 >The Techniques for Arbitrary Secure Quering to Encrypted Cloud Database Using Fully Homomorphic Encryption
【2h】

The Techniques for Arbitrary Secure Quering to Encrypted Cloud Database Using Fully Homomorphic Encryption

机译:使用完全同态加密对加密云数据库的任意安全Quering的技术

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers. Such a work is allowed by various types of so-called Processable encryption (PE), as well as special architectures of database management systems (DBMS) which use these types of encryption. The most known types of PEs are order-preserving encryption, homomorphic encryption, functional encryption, searchable encryption, and property-preserving encryption. Based on these types of encryption, various DBMSs are built, the most famous of which are CryptDB, Mo- nomi, Arx and DBMS by researchers from Novosibirsk. These DBMSs are built on the basis of various types of PEs, for example order-preserving encryption, homomorphic encryption and traditional block encryption. However, this approach can cause privacy problems. The best approach from the security viewpoint is to build a cryptographic database using only homomorphic encryption. An obstacle to this is insufficient efficiency of the existing homomorphic encryption schemes and incomplete solution of a set of issues related to ensuring the confidentiality of decisions making in an untrusted environment. In this paper, we propose the techniques for solving these problems, in particular for organization of execution arbitrary secure query to the encrypted relational database using fully homomorphic encryption. Also we propose a model of query condition that splits query into atomic predicates and linking condition. One of roposed technique is aimed at ensuring the security of linking condition of queries, others keep security of atomic predicates. The parameters of the proposed techniques make it possible to implement them using the already existing homomorphic encryption schemes. The proposed techniques can be a basis for building secure cryptographic cloud databases.
机译:在没有解密的情况下,最近通过加密器和数据库研究人员正在积极调查对加密数据库的查询。通过各种类型的可处理加密(PE)以及使用这些类型加密的数据库管理系统(DBMS)的特殊架构允许这样的工作。最着名的PE类型是定期保留加密,同态加密,功能加密,可搜索的加密和属性保留加密。基于这些类型的加密,构建了各种DBMS,其中最着名的是来自NovoSibirsk的研究人员的CryptdB,Mo-Nomi,Arx和DBMS。这些DBMS是基于各种类型的PE构建的,例如定期保留加密,同态加密和传统块加密。但是,这种方法可能导致隐私问题。安全视点的最佳方法是仅使用同型加密构建加密数据库。对此的障碍是现有的同性恋加密方案的效率和不完整的一系列问题的不完整解决方案,与确保在不受信任的环境中制定的决策保密性。在本文中,我们提出了解决这些问题的技术,特别是用于使用完全同态加密对加密关系数据库的执行任意安全查询的组织。此外,我们提出了一种查询条件的模型,将查询分成原子谓词和链接条件。牵引技术之一旨在确保疑问条件的安全性,其他人保持原子谓词的安全性。所提出的技术的参数使得可以使用已经存在的具有现有的同性恋加密方案来实现它们。该技术可以是构建安全加密云数据库的基础。

著录项

  • 作者

    F. B. Burtyka;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng;rus
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号