Diyala Journal For Pure Science
Scientific Refereed Journal Published By College of Science - University of Diyala
Forgotten my password !
Diyala Journal For Pure Sciences DJPS
ISRA Impact Factor:3.715
P- ISSN:2222-8373, E-ISSN:2518-9255
Volume 13, Issue 1, Part 1 , January. 2017
Retrieving Encrypted Query from Encrypted Database Depending on Symmetric Encrypted Cipher System Method
Ghassan H. Abdul-Majeed , Alaa Kadhim F. , Rasha Subhi Ali
Year: 2017, Volume: 13, Issue: 1, Part:1
Pages: 183-207, DOI: http://dx.doi.org/10.24237/djps.1301.103C
More and more data is available on database every day. The greater the amount of data in database led to create a problem in process and retrieving the required data. Security is one of the significant challenges that people are faced over the entire world in every aspect of their lives. Databases are vulnerable to attack from internal and external threats. One of security dialogues is data encryption/decryption whenever data being transmitted over communication lines may be protected by encrypting the data, which can be decrypted only by the authorized person. The retrieval from big encrypted database stills a big problem. The proposed system presents a new method used to retrieve data from (encrypted database; encrypted compressed database or encrypted dynamic clusters). These data retrieved represents the answers to the user query. In this research the retrieving from big encrypted database was processed by matching cipher query with encrypted database. The proposed system uses clustering technique to build block of data according to the encrypted user query (entries or requirements). The comparison includes the retrieving time that was required from matching plain query with plain data and cipher query with cipher data. In traditional system the retrieving was done by decrypting the entire database or decrypting part of it to find the data that matched the user query. This would be consumed too large time. The work of this paper allows to the users to query over encrypted database without decrypting the database, instead of that, it work on comparing cipher query with encrypted database and retrieving the results in cipher form. The data retrieval process is considered the main objective of this research and not the encryption process. So, the simple encryption operation was used to measure the performance of the data retrieving method (by matching encrypted query with encrypted data).
Keywords: Clustering, ICM, Encryption, Decryption, Information Retrieval, Matching cipher query with cipher data.