Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Doc

426 views

Published on

Published in: Economy & Finance, Technology
  • Be the first to like this

Doc

  1. 1. Privacy Preserving Schemes for SQL Operations Abhinav Parate, Bhupendra Singh Indian Institute of Technology, Kanpur Abstract. With the global emergence of concerns for the privacy of huge amount of information being collected in the databases, the research work in the field of protecting databases from exposure or any other attack has increased. Encryption techniques- both conventional and modern have proved out to be good technol- ogy in protecting the sensitive data. However, once encrypted, data can no longer be queried for operations like Greater Than, Less Than, Substring matching and others. The only operation that could be done on encrypted data is to find ex- act match. Hence, performing query over encrypted data is associated with the overhead of decrypting the entire encrypted data and then performing the oper- ations. Here we present two schemes

×