Netinfo Security ›› 2016, Vol. 16 ›› Issue (10): 28-33.doi: 10.3969/j.issn.1671-1122.2016.10.005

• Orginal Article • Previous Articles     Next Articles

Research on Method of Key Words Quick Search in Encrypted Databases

Junzheng XIANG1, Hequn XIAN1,2(), Chengliang TIAN1,3, Min LI1   

  1. 1.College of Computer Science and Technology, Qingdao University, Qingdao Shandong 266071, China
    2. The State University of Pennsylvania, Pennsylvania 16802, the USA
    3. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Received:2016-09-07 Online:2016-10-31 Published:2020-05-13

Abstract:

Database encryption is an efficient way to protect data security. Traditional key words query operation cannot be executed directly over encrypted databases. This paper designs an encrypted key words query method based on the bloom filter mechanism. In this method, key words are treated as strings, which are mapped by multiple hash functions and multiple indices are obtained. The bloom array is initialized to 0, and the value 0s of the positions corresponding to the indices of the bloom array are changed to 1s. When searching, the retrieved key words are mapped by the same hash functions and multiple indices are obtained. The search of the encrypted data is realized by judging whether the values of the positions corresponding to the indices of the bloom array are 1s. This paper also gives the introductions of the principle of bloom filter, error analysis and hash function. Experimental results show that the method has high efficiency and practicability.

Key words: bloom filter, encrypted database, hash function

CLC Number: