Encryption scheme supporting range queries on encrypted privacy databases in big data service era

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security and privacy issues are magnified by velocity, volume, and variety of big data, such as large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. Therefore, traditional security mechanisms, which are tailored to securing small scale static (as opposed to streaming) data, are inadequate. In this paper, we proposed Bucket ID Transformation that is a new encryption mechanism and the scheme can range search without order-preserving. Bucket ID Transformation is performed by recursive HMAC as many as a value of Bucket ID. As a future desk, we plan to carry out simulated experiments for performance evaluation and compare the results, and design and verify a provably secure encryption mechanism. © 2012 Springer Science+Business Media.

Cite

CITATION STYLE

APA

Lee, J. W., & Park, N. (2012). Encryption scheme supporting range queries on encrypted privacy databases in big data service era. In Lecture Notes in Electrical Engineering (Vol. 203 LNEE, pp. 739–746). https://doi.org/10.1007/978-94-007-5699-1_76

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free