Doc

403 views
352 views

Published on

Published in: Economy & Finance, Technology
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total views
403
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
3
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Doc

  1. 1. Privacy Preserving Schemes for SQL Operations Abhinav Parate, Bhupendra Singh Indian Institute of Technology, Kanpur Abstract. With the global emergence of concerns for the privacy of huge amount of information being collected in the databases, the research work in the field of protecting databases from exposure or any other attack has increased. Encryption techniques- both conventional and modern have proved out to be good technol- ogy in protecting the sensitive data. However, once encrypted, data can no longer be queried for operations like Greater Than, Less Than, Substring matching and others. The only operation that could be done on encrypted data is to find ex- act match. Hence, performing query over encrypted data is associated with the overhead of decrypting the entire encrypted data and then performing the oper- ations. Here we present two schemes

×