Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny
{"title":"对加密数据执行查询的安全算法","authors":"Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny","doi":"10.1109/ICOCS.2015.7483217","DOIUrl":null,"url":null,"abstract":"Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly without decrypting all records.","PeriodicalId":123709,"journal":{"name":"2015 Third World Conference on Complex Systems (WCCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A secure algorithm for executing queries over encrypted data\",\"authors\":\"Rasha Refaie, A. Ahmed, Nermin Hamza, Mahmood Al-monem, H. Hefny\",\"doi\":\"10.1109/ICOCS.2015.7483217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly without decrypting all records.\",\"PeriodicalId\":123709,\"journal\":{\"name\":\"2015 Third World Conference on Complex Systems (WCCS)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Third World Conference on Complex Systems (WCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOCS.2015.7483217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Third World Conference on Complex Systems (WCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOCS.2015.7483217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure algorithm for executing queries over encrypted data
Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly without decrypting all records.