Query Processing Performance on Encrypted Databases by Using the REA Algorithm

Encryption in database systems is an important topic for research, as secure and efficient algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption of data. Clearly, there is a compromise between the degree of security provided by encryption and the efficient querying of the database, because the operations of encryption and decryption greatly degrade query performance. In this paper we propose a new encryption algorithm, which we call Reverse Encryption Algorithm (REA). Our new encryption algorithm (REA) is simple and is fast enough for most applications. REA encryption algorithm provides maximum security and limits the added time cost for encryption and decryption to as to not degrade the performance of a database system. Also, we evaluate the query processing performance over encrypted database with our new encryption algorithm (REA) and with the most common encryption algorithm AES. The performance measure of query processing will be conducted in terms of query execution time. Results of a set of experiments validate the functionality and usability of the proposed algorithm REA.

[1]  Min Wang,et al.  Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.

[2]  Dongyao Ji,et al.  Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..

[3]  Hiroyuki Kitagawa,et al.  MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..

[4]  Sushil Jajodia,et al.  Metadata Management in Outsourced Encrypted Databases , 2005, Secure Data Management.

[5]  Huy Hoang Ngo,et al.  Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..

[6]  Alberto Ceselli,et al.  Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.

[7]  Yuefei Zhu,et al.  New Efficient Searchable Encryption Schemes from Bilinear Pairings , 2010, Int. J. Netw. Secur..

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Sushil Jajodia,et al.  Implementation of a Storage Mechanism for Untrusted DBMSs , 2003, Second IEEE International Security in Storage Workshop.

[10]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[11]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[12]  Mohey M. Hadhoud,et al.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..

[13]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[14]  Sehun Kim,et al.  Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..

[15]  Hakan Hacigümüs,et al.  Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.

[16]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[17]  K. M. S. Soyjaudah,et al.  Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..