Please use this identifier to cite or link to this item:
http://148.72.244.84/xmlui/handle/xmlui/4630
Title: | Retrieving Encrypted Query from Encrypted Database Depending on Symmetric Encrypted Cipher System Method |
Authors: | Ghassan H. Abdul-Majeed Alaa Kadhim F. Rasha Subhi Ali |
Keywords: | Clustering, ICM, Encryption, Decryption, Information Retrieval, Matching cipher query with cipher data. |
Issue Date: | 2017 |
Publisher: | university of Diyala |
Citation: | http://dx.doi.org/10.24237/djps.1301.103C |
Abstract: | More and more data is available on database every day. The greater the amount of data in database led to create a problem in process and retrieving the required data. Security is one of the significant challenges that people are faced over the entire world in every aspect of their lives. Databases are vulnerable to attack from internal and external threats. One of security dialogues is data encryption/decryption whenever data being transmitted over communication lines may be protected by encrypting the data, which can be decrypted only by the authorized person. The retrieval from big encrypted database stills a big problem. The proposed system presents a new method used to retrieve data from (encrypted database; encrypted compressed database or encrypted dynamic clusters). These data retrieved represents the answers to the user query. In this research the retrieving from big encrypted database was processed by matching cipher query with encrypted database. The proposed system uses clustering technique to build block of data according to the encrypted user query (entries or requirements). The comparison includes the retrieving time that was required from matching plain query with plain data and cipher query with cipher data. In traditional system the retrieving was done by decrypting the entire database or decrypting part of it to find the data that matched the user query. This would be consumed too large time. The work of this paper allows to the users to query over encrypted database without decrypting the database, instead of that, it work on comparing cipher query with encrypted database and retrieving the results in cipher form. The data retrieval process is considered the main objective of this research and not the encryption process. So, the simple encryption operation was used to measure the performance of the data retrieving method (by matching encrypted query with encrypted data). |
URI: | http://148.72.244.84:8080/xmlui/handle/xmlui/4630 |
ISSN: | 2222-8373 |
Appears in Collections: | مجلة ديالى للعلوم الاكاديمية / Academic Science Journal (Acad. Sci. J.) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
15-P1e.pdf | 1.27 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.