Features of software implementing the prefix search method in cryptographically protected databases

Keywords: Database, Searchable encryption, Confidentiality, Software

Abstract

The article addresses the specific considerations associated with the development of software implementing the prefix search method in cryptographically protected databases. This method is a variant of symmetric searchable encryption, which allows search among the encrypted data. The prefix search method allows searching for prefixes among encrypted data without the need for decryption. Such an approach resolves the issue of maintaining data confidentiality stored on remote or cloud servers. However, its usage introduces a set of issues that must be considered during the development of the corresponding software. The paper analyzes the requirements for software that implements the prefix search method, defines the software architecture, and justifies the choice of technologies and tools for software implementation, including ASP.NET, Java, JavaScript, PHP, Python programming languages, MongoDB database management system, and the FastAPI framework. A description of the deployment process of the corresponding software is provided. To assess the performance of the developed software, the well-known Apache JMeter tool for conducting load testing was utilized. The obtained performance evaluations of the proposed solution indicate acceptable time delays in processing relevant data search queries.

Downloads

Download data is not yet available.

Author Biographies

Serhii Lilikovych, V. N. Karazin Kharkiv National University

CSD Student (magistrate), Department of Security of Information Systems and Technologies

Vitalii Yesin, V. N. Karazin Kharkiv National University

Doctor of Engineering Sciences, Full Professor, Department of Security of Information Systems and Technologies

References

SoK: Cryptographically Protected Database Search / Benjamin Fuller [et al.] // 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2017. – Mode of access: https://doi.org/10.1109/sp.2017.10 (date of access: 05.01.2024)

Technique for Searching Data in a Cryptographically Protected SQL Database / Vitalii Yesin [et al.] // Applied Sciences. – 2023. – Vol. 13, no. 20. – P. 11525. – Mode of access: https://doi.org/10.3390/app132011525 (date of access: 05.01.2024)

Azraoui M. Framework for Searchable Encryption with SQL Databases / Monir Azraoui, Melek Önen, Refik Molva // 8th In-ternational Conference on Cloud Computing and Services Science, Funchal, Madeira, Portugal, 19–21 March 2018. – Mode of access: https://doi.org/10.5220/0006666100570067 (date of access: 05.01.2024)

A Survey of Provably Secure Searchable Encryption / Christoph Bösch [et al.] // ACM Computing Surveys. – 2015. – Vol. 47, no. 2. – P. 1–51. – Mode of access: https://doi.org/10.1145/2636328 (date of access: 05.01.2024)

Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC / Rajkumar Ramasamy [et al.] // 2017 IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud), New York, NY, 26–28 June 2017.– Mode of access: https://doi.org/10.1109/cscloud.2017.47 (date of access: 05.01.2024)

Лілікович С.О. Метод пошуку за префіксом в зашифрованих базах даних / Лілікович С.О., Єсін В.І. // Комп’ютерне моделювання в наукоємних технологіях : Зб. наук. пр. міжнар. науково-техн. конф., Харків, 25–27 жовт. 2023 р.– С. 105–108.

Handa R. Searchable encryption: A survey on privacy preserving search schemes on encrypted outsourced data / Rohit Handa, C. Rama Krishna, Naveen Aggarwal // Concurrency and Computation: Practice and Experience. – 2019. – P. e5201. – Mode of access: https://doi.org/10.1002/cpe.5201 (date of access: 05.01.2024)

Pattern-Oriented Software Architecture Volume 1: A System of Patterns / Frank Buschmann [et al.]: Wiley, 1996. – 476 p.

Published
2024-01-17
Cited
How to Cite
Lilikovych, S., & Yesin, V. (2024). Features of software implementing the prefix search method in cryptographically protected databases. Computer Science and Cybersecurity, (1), 49-62. Retrieved from https://periodicals.karazin.ua/cscs/article/view/23093
Section
Статті