Search In this Thesis
   Search In this Thesis  
العنوان
Security and Query Processing on Encrypted NoSQL Databases /
المؤلف
Fouly, Mohamed Ahmed.
هيئة الاعداد
باحث / محمد أحمد فولي
مشرف / تيسير حسن أحمد سليمان
مناقش / عبد المجيد أمين علي
مناقش / خالد فتحي صالح
الموضوع
Database management(NoSQL Databases).
تاريخ النشر
2023.
عدد الصفحات
102 P. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Information Systems
الناشر
تاريخ الإجازة
4/5/2023
مكان الإجازة
جامعة أسيوط - كلية الحاسبات والمعلومات - Information Systems
الفهرس
Only 14 pages are availabe for public view

from 115

from 115

Abstract

Distributed computing includes putting aside the data utilizing outsider storage and being able to get this information from a place at any time. Due to the advancement of distributed computing and databases, highly critical data are put in databases. However, the information is saved in outsourced services like Database as a Service (DaaS), and security issues are raised from both the server and client side. Also, query processing on the database by different clients through the time consuming methods and shared resources environment may cause inefficient data
processing and retrieval. Secure and efficient data regaining can be obtained with the help of an efficient data processing algorithm among different clients.
In this thesis, we propose a well-organized through an Efficient Secure Query Processing Algorithm (ESQPA) for query processing efficiently by utilizing the concepts of data compression before sending the encrypted results from the server to clients. We have addressed security issues through securing the data at the server-side by an encrypted database. One of the most popular practical encrypted database systems is CryptDB. There are three connected components in CryptDB: database server, proxy server, and clients. CryptDB encrypts various table columns by various encryption algorithms called onion layers encryption technique. The proxy server is placed between the clients and the main database server to encode the plain text query from the client to secure the data and the encrypted text is then sent to the database server. The server packs the information and gets the encoded response from the information base and sends it back to the intermediary server and the decoded structure is shipped off to the clients. Encryption techniques have recently been proposed to present clients with confidentiality in terms of cloud storage. This method allows the queries to be processed using encrypted data without decryption.