DocumentCode :
2709321
Title :
Adaptive bucket formation in encrypted databases
Author :
Tang, Yi ; Zhang, Liankuan
Author_Institution :
Dept. of Inf. Sci., Guangzhou Univ., China
fYear :
2005
fDate :
29 March-1 April 2005
Firstpage :
116
Lastpage :
119
Abstract :
As the mode of e-business is patterned widely, many small and medium enterprises need to rely on the database service provided by the third parties. Encryption techniques must be adopted to protect sensitive data from the service providers. A bucket-based storage technique addresses the scenarios with limit trust in database servers. However, when the buckets are constructed improperly, intruders could have a chance to guess the sensitive value distribution based on the bucket occurrences. In this paper, we propose a simple and adaptive method, named split and merge (SAM), to construct a set of buckets with balanced occurrences. The buckets with more occurrences are splitted in two parts and the neighbor bucket pairs with smaller occurrences are merged together. Some experiments are conducted to validate this method.
Keywords :
Internet; cryptography; database management systems; electronic commerce; small-to-medium enterprises; adaptive bucket formation; database service; e-business; encryption technique; small-to-medium enterprise; storage technique; Cryptography; Database systems; Electronic switching systems; Energy management; Information science; Power system management; Power system modeling; Protection; Web and internet services; Web server;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
e-Technology, e-Commerce and e-Service, 2005. EEE '05. Proceedings. The 2005 IEEE International Conference on
Print_ISBN :
0-7695-2274-2
Type :
conf
DOI :
10.1109/EEE.2005.27
Filename :
1402279
Link To Document :
بازگشت