SEQURESQL – A FRAMEWORK FOR QUERY OPTIMIZATION AND PRIVACY ON OUTSOURCED DATA
Abstract
Database outsourcing has become a trend in the information technology industry because it offers scalability to the enormous amount of digital content stored and generated on a daily basis by individuals and corporations. In large outsourced databases the efficiency of data retrieval, especially as it relates to privacy, remains an open challenge, because traditional query languages cannot work with encrypted data. While several architectures, techniques and tools have been
proffered to ensure that privacy and performance are balanced and optimized, each of these approaches has its limitations. This research proposes a novel framework which focuses on optimizing server-side data retrieval and query efficiency through the use of hash map and AES 128-bit encryption algorithm. The design and implementation of secureSQL is built on the clientside without any alteration to the DBMS structure. SecureSQL model guarantees efficiency and is
able to execute 20 out of the 22 Transaction Processing Performance Council (TPC-H) benchmark queries while ensuring privacy. This is proof that it is not restricted to simple query constructs but is able to handle even complex queries involving nested sub queries and joins. The execution time of queries between the client and database on the cloud is minimized, with a 0(1) time complexity as is evident in the comparative performance analysis between secureSQL and the traditional method. This is quantified using numerical results.
References
Alhanjouri M. and Al Derawi A.(2012) “A New Method of Query over Encrypted Data in Database using Hash Map”, International Journal of Computer Applications (IJCA), 41(4): 46-51, March 2012. Published by Foundation of Computer Science, NY, USA. Retrieved from: http://research.ijcaonline.org/volume41/number4/pxc3877580.pdf
Bachhav A., Kharat V. and Shelar M. (2017). Query Optimization for Databases in Cloud Environment: A Survey. In International Journal of Database Theory and Application. Vol.10, No.6 (2017), pp.1-12 http://dx.doi.org/10.14257/ijdta.2017.10.6.01
Davida G.I., Wells D.L. and Kam J.B. (1981). A Database Encryption System with Subkeys. ACM Trans. Database Syst., 6(2):312-328.
Elmasri R. (2008). Fundamentals of database systems. Pearson Education India.
Copyright (c) 2023 FUDMA JOURNAL OF SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences