Loading...

Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm

Jafarinejad, M ; Sharif University of Technology | 2018

829 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s10619-018-7220-x
  3. Publisher: Springer New York LLC , 2018
  4. Abstract:
  5. One of the organizations’ main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we propose an enhanced ant-colony algorithm (named BACO) which aims to reduce the required processing efforts in multi-join query optimization problem alongside with reducing the total false-positive results generated in Bucket-based encrypted databases. Our enhanced solution approach leads to much less response time without losing solutions’ quality. Experimental results denote that our proposed solution can yield 75% decrease in multi-join queries processing efforts and 74% decrease in the total amount of false-positive results in a faster manner and with better performance than previous methods. © 2018, Springer Science+Business Media, LLC, part of Springer Nature
  6. Keywords:
  7. Bucket-based encryption ; Multi-join queries ; Ant colony optimization ; Artificial intelligence ; Query languages ; Query processing ; Ant colony algorithms ; Ant Colony Optimization algorithms ; Critical operations ; Database encryption ; Encrypted database ; Multi-join ; Query optimization ; Security and performance ; Cryptography
  8. Source: Distributed and Parallel Databases ; Volume 36, Issue 2 , 2018 , Pages 399-441 ; 09268782 (ISSN)
  9. URL: https://link.springer.com/article/10.1007/s10619-018-7220-x