• DocumentCode
    2709321
  • Title

    Adaptive bucket formation in encrypted databases

  • Author

    Tang, Yi ; Zhang, Liankuan

  • Author_Institution
    Dept. of Inf. Sci., Guangzhou Univ., China
  • fYear
    2005
  • fDate
    29 March-1 April 2005
  • Firstpage
    116
  • Lastpage
    119
  • Abstract
    As the mode of e-business is patterned widely, many small and medium enterprises need to rely on the database service provided by the third parties. Encryption techniques must be adopted to protect sensitive data from the service providers. A bucket-based storage technique addresses the scenarios with limit trust in database servers. However, when the buckets are constructed improperly, intruders could have a chance to guess the sensitive value distribution based on the bucket occurrences. In this paper, we propose a simple and adaptive method, named split and merge (SAM), to construct a set of buckets with balanced occurrences. The buckets with more occurrences are splitted in two parts and the neighbor bucket pairs with smaller occurrences are merged together. Some experiments are conducted to validate this method.
  • Keywords
    Internet; cryptography; database management systems; electronic commerce; small-to-medium enterprises; adaptive bucket formation; database service; e-business; encryption technique; small-to-medium enterprise; storage technique; Cryptography; Database systems; Electronic switching systems; Energy management; Information science; Power system management; Power system modeling; Protection; Web and internet services; Web server;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Technology, e-Commerce and e-Service, 2005. EEE '05. Proceedings. The 2005 IEEE International Conference on
  • Print_ISBN
    0-7695-2274-2
  • Type

    conf

  • DOI
    10.1109/EEE.2005.27
  • Filename
    1402279