To ensure the privacy of data in the relational databases, prior work has given techniques to support data encryption and execute SQL queries over the encrypted data. However, the problem of how to put these techniques together in an optimum manner was not addressed, which is equivalent to having an RDBMS without a query optimizer. This paper models and solves that optimization problem. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Hacigümüş, H., Iyer, B., & Mehrotra, S. (2005). Query optimization in encrypted database systems. In Lecture Notes in Computer Science (Vol. 3453, pp. 43–55). Springer Verlag. https://doi.org/10.1007/11408079_7
Mendeley helps you to discover research relevant for your work.