Security and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small scale static (as opposed to streaming) data, are inadequate. In this paper, we proposed Bucket ID Transformation that is a new encryption mechanism and the scheme can range search without order-preserving. Bucket ID Transformation is performed by recursive HMAC as many as a value of Bucket ID. As a future desk, we plan to carry out simulated experiments for performance evaluation and compare the results, and design and verify a provably secure encryption mechanism. © 2012 Springer Science+Business Media.
CITATION STYLE
Lee, J. W., & Park, N. (2012). Encryption scheme supporting range queries on encrypted privacy databases in big data service era. In Lecture Notes in Electrical Engineering (Vol. 203 LNEE, pp. 739–746). https://doi.org/10.1007/978-94-007-5699-1_76
Mendeley helps you to discover research relevant for your work.