Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
Adaptive Bucket Formation in Encrypted Databases
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
The distributed breakout algorithms
Artificial Intelligence - Special issue: Distributed constraint satisfaction
A Method for Reducing False Hits in Querying Encrypted Databases
CEC-EEE '06 Proceedings of the The 8th IEEE International Conference on E-Commerce Technology and The 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services
Query optimization in encrypted database systems
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
Hi-index | 0.00 |
Outsourcing databases to third parties demonstrates a trend for many enterprise users. A bucket-based storage method is proposed for this emerging scenario. However, the introduction of buckets brings out challenges in balancing query efficiency and data secrecy. By measuring the query efficiency on false hits and the data secrecy on entropy amounts, an optimization problem is formalized to find a set of buckets on a tradeoff between efficiency and secrecy. We propose a multi-agent based method to find an approximate solution to this problem. In our solving, each agent manages a bucket and always tries to decrease the number of false hits by moving out a managed element on local evaluations. These local behaviors are aggregated as a global trend to find a set of buckets with fewer false hits. We validate this method by conducting simulated experiments on range queries.