TY - JOUR
T1 - Cryptographic relational algebra for databases using the field authenticator
AU - Chen, Chien Yuan
AU - Ku, Cheng-Yuan
AU - Yen, David C.
PY - 2007/7
Y1 - 2007/7
N2 - In this paper, a field authentication scheme, suitable for providing more efficient operations within an encrypted database, is introduced and discussed. Applying the concept of this proposed scheme, the database will be safeguarded and protected for situations such as a ciphertext search attack, a plaintext substitution attack, and/or a ciphertext substitution attack. In addition, this proposed scheme can be used to facilitate the "projections" operation executed in the database while also allowing the individual field value to be decrypted and authenticated. It is also important to note that the "selection" operation can be directly applied to the resultant database without the tediousness of going through the decryption process by using the random filters concept in the field authentication. Furthermore, the use of the aforementioned concept can eliminate exposure of some unqualified records and, as a result, speed up the process of executing the query.
AB - In this paper, a field authentication scheme, suitable for providing more efficient operations within an encrypted database, is introduced and discussed. Applying the concept of this proposed scheme, the database will be safeguarded and protected for situations such as a ciphertext search attack, a plaintext substitution attack, and/or a ciphertext substitution attack. In addition, this proposed scheme can be used to facilitate the "projections" operation executed in the database while also allowing the individual field value to be decrypted and authenticated. It is also important to note that the "selection" operation can be directly applied to the resultant database without the tediousness of going through the decryption process by using the random filters concept in the field authentication. Furthermore, the use of the aforementioned concept can eliminate exposure of some unqualified records and, as a result, speed up the process of executing the query.
KW - Database encryption
KW - Information Security
KW - Integrity
KW - Relational databases
UR - http://www.scopus.com/inward/record.url?scp=34347226340&partnerID=8YFLogxK
U2 - 10.1016/j.camwa.2006.08.038
DO - 10.1016/j.camwa.2006.08.038
M3 - Article
AN - SCOPUS:34347226340
SN - 0898-1221
VL - 54
SP - 38
EP - 44
JO - Computers and Mathematics with Applications
JF - Computers and Mathematics with Applications
IS - 1
ER -