Query optimization in encrypted database systems

22Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To ensure the privacy of data in the relational databases, prior work has given techniques to support data encryption and execute SQL queries over the encrypted data. However, the problem of how to put these techniques together in an optimum manner was not addressed, which is equivalent to having an RDBMS without a query optimizer. This paper models and solves that optimization problem. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hacigümüş, H., Iyer, B., & Mehrotra, S. (2005). Query optimization in encrypted database systems. In Lecture Notes in Computer Science (Vol. 3453, pp. 43–55). Springer Verlag. https://doi.org/10.1007/11408079_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free