TAILIEUCHUNG - Executing SQL over Encrypted Data in the Database-Service-Provider Model

The scripts provided as part of this paper are sample code which can be used to base your own scripts on. These scripts have been tested on an Oracle Enterprise Linux - 2 node cluster. It is expected that they should work on all Oracle Clusterware supported platforms. Oracle Support cannot provide any direct support for these scripts. You should thoroughly test the scripts – in particular the check action of each script to ensure compatibility with your operating system. The check action implemented in the sample scripts for the listener and the database simply ensure that a process is. | Executing SQL over Encrypted Data in the Database-Service-Provider Model Hakan Hacigủmủẹ5 1 Bala Iyer2 Chen Li1 Sharad Mehrotra1 Department of Information and Computer Science University of California Irvine CA 92697 USA hakanh@ chenli sharad @ 2IBM Silicon Valley Lab. San Jose CA 95141 USA balaiyer@ ABSTRACT Rapid advances in networking and Internet technologies have fueled the emergence of the software as a service model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet electronic mail services general storage services disaster protection services. Database as a Service model provides users power to create store modify and retrieve data from anywhere in the world as long have access to the Internet. It introduces several challenges an important issue being data privacy. It is in this context that we specifically address the issue of data privacy. . There are two main privacy issues. First the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second data needs to be protected even from the service providers if the providers themselves cannot be trusted. In this paper we focus on the second challenge. Specifically we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers site without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented. 1. INTRODUCTION The Internet has made it possible for all computers to be connected to one another. The influence of transactionprocessing systems and the Internet ushered in the era of e-business. The Internet has also had a

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.