DocumentCode
2709321
Title
Adaptive bucket formation in encrypted databases
Author
Tang, Yi ; Zhang, Liankuan
Author_Institution
Dept. of Inf. Sci., Guangzhou Univ., China
fYear
2005
fDate
29 March-1 April 2005
Firstpage
116
Lastpage
119
Abstract
As the mode of e-business is patterned widely, many small and medium enterprises need to rely on the database service provided by the third parties. Encryption techniques must be adopted to protect sensitive data from the service providers. A bucket-based storage technique addresses the scenarios with limit trust in database servers. However, when the buckets are constructed improperly, intruders could have a chance to guess the sensitive value distribution based on the bucket occurrences. In this paper, we propose a simple and adaptive method, named split and merge (SAM), to construct a set of buckets with balanced occurrences. The buckets with more occurrences are splitted in two parts and the neighbor bucket pairs with smaller occurrences are merged together. Some experiments are conducted to validate this method.
Keywords
Internet; cryptography; database management systems; electronic commerce; small-to-medium enterprises; adaptive bucket formation; database service; e-business; encryption technique; small-to-medium enterprise; storage technique; Cryptography; Database systems; Electronic switching systems; Energy management; Information science; Power system management; Power system modeling; Protection; Web and internet services; Web server;
fLanguage
English
Publisher
ieee
Conference_Titel
e-Technology, e-Commerce and e-Service, 2005. EEE '05. Proceedings. The 2005 IEEE International Conference on
Print_ISBN
0-7695-2274-2
Type
conf
DOI
10.1109/EEE.2005.27
Filename
1402279
Link To Document