Loading...

A Secure and Effcient Approach for Processing Join Query on Encrypted Outsourced Data

Hadian, Saman | 2021

319 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 54238 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Jalili, Rasool
  7. Abstract:
  8. Data outsourcing As a cloud service, it is a solution to reduce the cost of data storage and management in small and medium organizations. One of the main concerns in this area is the privacy of data owners and the non-disclosure of information by curious (albeit trusted) public cloud service providers. Resolving this issue requires encrypting the data before sending it to the cloud server. Transferring all encrypted data to the cloud server and performing various queries after encryption imposes a lot of time, computational and storage overhead, which destroys the philosophy of outsourcing. One of the open research issues is the processing of join queries over encrypted data by the cloud server. First, Ms. Popa introduced the concept of adjustable join by presenting a symmetric cryptographic scheme. In Subsequent schemes added to the security of the adjustable join scheme, and also suggested joining for more than two columns, which is structurally very different from joining multiple columns in a normal database because the join of the subsets of these columns should not be leaked. With the addition of such security concepts, the complexity of the link operation is inefficient in practice for more than three columns. In this research, we first present a new scheme and model the syntax and security of the scheme from the latest scheme. Then we present an algorithm that has a great impact on solving the bottleneck of the previous scheme. The scheme is designed to be flexible to the user’s needs. the user can accept leaks to improve the complexity of the calculations. Finally, we have gone beyond the user with Providing an algorithm for leaks, we have significantly improved the leaks of join queries provided by the user. The flexibility of this design has made it possible to perform join queries in a large number of columns with low leakage. In order to evaluate, we will implement the obtained encryption scheme and compare its performance and security level with the previous methods. The safety of the proposed method will also be proved according to the previous methods
  9. Keywords:
  10. Fully Homomorphic Encryption ; Cloud Computing ; Secure Computation ; Database Outsourcing ; Searchable Encryption ; Adjustable Join ; Structured Multi Adjustable Join Scheme

 Digital Object List

 Bookmark

No TOC