A study for method of construct encryption scheme for supporting range query based on bucket ID transformation about sensor applications

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number generation. This method is more powerful than the previous order-preserving methods and is expected to handle data more efficiently than other methods including auxiliary B+-tree. Experiment results show that our scheme outperforms other method in encryption and query speed. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Song, Y. J., Cha, J. S., & Kang, J. M. (2011). A study for method of construct encryption scheme for supporting range query based on bucket ID transformation about sensor applications. In Communications in Computer and Information Science (Vol. 200 CCIS, pp. 292–305). https://doi.org/10.1007/978-3-642-23141-4_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free