Open Access   Article Go Back

Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB

G. Ambika1 , P. Srivaramangai2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 735-741, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.735741

Online published on Aug 31, 2018

Copyright © G. Ambika, P. Srivaramangai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Ambika, P. Srivaramangai, “Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.735-741, 2018.

MLA Style Citation: G. Ambika, P. Srivaramangai "Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB." International Journal of Computer Sciences and Engineering 6.8 (2018): 735-741.

APA Style Citation: G. Ambika, P. Srivaramangai, (2018). Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB. International Journal of Computer Sciences and Engineering, 6(8), 735-741.

BibTex Style Citation:
@article{Ambika_2018,
author = {G. Ambika, P. Srivaramangai},
title = {Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {735-741},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2763},
doi = {https://doi.org/10.26438/ijcse/v6i8.735741}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.735741}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2763
TI - Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB
T2 - International Journal of Computer Sciences and Engineering
AU - G. Ambika, P. Srivaramangai
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 735-741
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
396 215 downloads 117 downloads
  
  
           

Abstract

Internet of Things (IoT) consists of two merging technologies IoT and Cloud Computing is known as IoT. In the cloud, the large amount of data might be gathered by various IoT applications. Privacy and Security concerns on behalf of IoT are proven targets of great significance. Encrypted Query Processing is securely to protect data confidentiality as preserving confidentiality and performing a standard set of SQL queries in an accurate manner for IoT. In this paper, compare the CryptDB and TrustedDB encrypted query processing systems with the purpose of IoT data stores securely in the Cloud database. The performance of an encrypted databases CryptDB and TrustedDB are compared by using SQL queries from TPC-H benchmark. As a result of that TrustedDB is performed as more efficient and scalable to large datasets.

Key-Words / Index Term

Internet of Things, TrustedDB, CryptDB, Encrypted Query Processing, Homomorphic Encryption

References

[1]. Ken Eguro and Ramarathnam Venkatesan. FPGAs for trusted cloud computing. In 22nd International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, pages 6370, 2012.
[2]. Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems”, river publishers’ series in communications, 2013.
[3]. Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deployment”, river publishers’ series in communications, 2014.
[4]. https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/Technology/TechnologyRoadmap/InternetOfThings.pdf
[5]. Popa, R. A. (2014). Building practical systems that compute on encrypted data. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA.
[6]. R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In SIGMOD ’03, 2003.
[7]. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD ’04, 2004.
[8]. M. R. Asghar, G. Russello, B. Crispo, and M. Ion. Supporting complex queries and access policies for multi-user encrypted databases. In Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, CCSW ’13, pages 77–88, New York, NY, USA, 2013. ACM.
[9]. M. J. Atallah, K. B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In CCS ’05, 2005.
[10]. A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. IACR Cryptology ePrint Archive, 2012.
[11]. V. Ciriani, S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality. In Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, pages 440–455, Berlin, Heidelberg, 2009. Springer-Verlag.
[12]. E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Key management for multi-user encrypted databases. In StorageSS ’05, 2005.
[13]. E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS ’03, 2003.
[14]. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-enrcryption: Management of access control evolution on outsourced data. In VLDB, 2007.
[15]. H. Hacigümü¸s, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD ’02, 2002.
[16]. R. A. Popa and N. Zeldovich. Multi-key searchable encryption. IACR Cryptology ePrint Archive, 2013:508, 2013.
[17]. R. A. Poppa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: Proctecting confidentiality with encrypted query processing. In SOSP ’11, 2011.
[18]. D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In SP ’00, 2000.
[19]. Y. Yang, F. Bao, X. Ding, and R. H. Deng. Multiuser private queries over encrypted databases. Int. J. Appl. Cryptol., 1(4):309–319, Aug. 2009.
[20]. IBM 4764 PCI-X Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/ pcixcc/overview.shtml, 2007.
[21]. IBM 4765 PCIe Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/ pciecc/overview.shtml, 2010.
[22]. TPC-H Benchmark, http://www.tpc.org/tpch/, 2013.