Encrypted Query Data Processing in Internet Of Things(IoTs) : CryptDB and Trusted DB
DOI:
https://doi.org/10.26438/ijcse/v6i8.735741Keywords:
Internet of Things, TrustedDB, CryptDB, Encrypted Query Processing, Homomorphic EncryptionAbstract
Internet of Things (IoT) consists of two merging technologies IoT and Cloud Computing is known as IoT. In the cloud, the large amount of data might be gathered by various IoT applications. Privacy and Security concerns on behalf of IoT are proven targets of great significance. Encrypted Query Processing is securely to protect data confidentiality as preserving confidentiality and performing a standard set of SQL queries in an accurate manner for IoT. In this paper, compare the CryptDB and TrustedDB encrypted query processing systems with the purpose of IoT data stores securely in the Cloud database. The performance of an encrypted databases CryptDB and TrustedDB are compared by using SQL queries from TPCH benchmark. As a result of that TrustedDB is performed as more efficient and scalable to large datasets
References
[1] Ken Eguro and Ramarathnam Venkatesan. FPGAs for trusted cloud computing. In 22nd International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, pages 6370, 2012.
[2] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems”, river publishers’ series in communications, 2013.
[3] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deployment”, river publishers’ series in communications, 2014.
[5] Popa, R. A. (2014). Building practical systems that compute on encrypted data. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA.
[6] R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In SIGMOD ’03, 2003.
[7] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD ’04, 2004.
[8] M. R. Asghar, G. Russello, B. Crispo, and M. Ion. Supporting complex queries and access policies for multi-user encrypted databases. In Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, CCSW ’13, pages 77–88, New York, NY, USA, 2013. ACM.
[9] M. J. Atallah, K. B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In CCS ’05, 2005.
[10] A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. IACR Cryptology ePrint Archive, 2012.
[11] V. Ciriani, S. De Capitani Di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality. In Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, pages 440–455, Berlin, Heidelberg, 2009. Springer-Verlag.
[12] E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Key management for multi-user encrypted databases. In StorageSS ’05, 2005.
[13] E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS ’03, 2003.
[14] S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-enrcryption: Management of access control evolution on outsourced data. In VLDB, 2007.
[15] H. Hacigümü¸s, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD ’02, 2002.
[16] R. A. Popa and N. Zeldovich. Multi-key searchable encryption. IACR Cryptology ePrint Archive, 2013:508, 2013.
[17] R. A. Poppa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: Proctecting confidentiality with encrypted query processing. In SOSP ’11, 2011.
[18] D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In SP ’00, 2000.
[19] Y. Yang, F. Bao, X. Ding, and R. H. Deng. Multiuser private queries over encrypted databases. Int. J. Appl. Cryptol., 1(4):309–319, Aug. 2009.
[20] IBM 4764 PCI-X Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/ pcixcc/overview.shtml, 2007.
[21] IBM 4765 PCIe Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/ pciecc/overview.shtml, 2010.
[22] TPC-H Benchmark, http://www.tpc.org/tpch/, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
