Technique for Searching Data in a Cryptographically Protected SQL Database
The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms th...
Uložené v:
| Vydané v: | Applied sciences Ročník 13; číslo 20; s. 11525 |
|---|---|
| Hlavní autori: | , , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Basel
MDPI AG
01.10.2023
|
| Predmet: | |
| ISSN: | 2076-3417, 2076-3417 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms that provide the ability to effectively use encryption to protect data. However, the use of traditional encryption methods faces a problem. Namely, traditional encryption, by making it impossible for insiders and outsiders to access data without knowing the keys, excludes the possibility of searching. This paper presents a solution that provides a strong level of confidentiality when searching, inserting, modifying, and deleting the required sensitive data in a remote database whose data are encrypted. The proposed SQL query processing technique allows the DBMS server to perform search functions over encrypted data in the same way as in an unencrypted database. This is achieved through the organization of automatic decryption by specially developed secure software of the corresponding data required for search, without the possibility of viewing these data itself. At that, we guarantee the integrity of the stored procedures used and special tables that store encrypted modules of special software and decryption keys, the relevance and completeness of the results returned to the application. The results of the analysis of the feasibility and effectiveness of the proposed solution show that the proper privacy of the stored data can be achieved at a reasonable overhead. |
|---|---|
| AbstractList | The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms that provide the ability to effectively use encryption to protect data. However, the use of traditional encryption methods faces a problem. Namely, traditional encryption, by making it impossible for insiders and outsiders to access data without knowing the keys, excludes the possibility of searching. This paper presents a solution that provides a strong level of confidentiality when searching, inserting, modifying, and deleting the required sensitive data in a remote database whose data are encrypted. The proposed SQL query processing technique allows the DBMS server to perform search functions over encrypted data in the same way as in an unencrypted database. This is achieved through the organization of automatic decryption by specially developed secure software of the corresponding data required for search, without the possibility of viewing these data itself. At that, we guarantee the integrity of the stored procedures used and special tables that store encrypted modules of special software and decryption keys, the relevance and completeness of the results returned to the application. The results of the analysis of the feasibility and effectiveness of the proposed solution show that the proper privacy of the stored data can be achieved at a reasonable overhead. |
| Audience | Academic |
| Author | Kozak, Ruslan Karpinski, Mikolaj Vilihura, Vladyslav Yesina, Maryna Shevchuk, Ruslan Yesin, Vitalii |
| Author_xml | – sequence: 1 givenname: Vitalii orcidid: 0000-0003-1977-7269 surname: Yesin fullname: Yesin, Vitalii – sequence: 2 givenname: Mikolaj orcidid: 0000-0002-8846-332X surname: Karpinski fullname: Karpinski, Mikolaj – sequence: 3 givenname: Maryna surname: Yesina fullname: Yesina, Maryna – sequence: 4 givenname: Vladyslav surname: Vilihura fullname: Vilihura, Vladyslav – sequence: 5 givenname: Ruslan orcidid: 0000-0003-1323-0801 surname: Kozak fullname: Kozak, Ruslan – sequence: 6 givenname: Ruslan orcidid: 0000-0001-5381-9528 surname: Shevchuk fullname: Shevchuk, Ruslan |
| BookMark | eNptkctOHDEQRS1EpABhlw9oKdsM8aPbjyUaCBCNFBCwtsru8oxHTbtxm8X8fQwTJBTFXrhUuueqyveYHI5pREK-MnomhKE_YJqY4JSxjncH5IhTJReiZerwQ_2ZnM7zltZjmNCMHpFfD-g3Y3x-wSak3NwjZL-J47q5gAJNHBtolnk3lbTOMG2ih2HYNbc5FfQF--b-bvWmdDDjF_IpwDDj6d_3hDz-vHxYXi9Wv69uluerhW-pLAvNZR1R8aBAoDFagkHDJASnlEOBfS9dr6UQWjuHTGPwAijHzgBvg9PihNzsffsEWzvl-AR5ZxNE-9ZIeW0hl-gHtFqJrgNgDjhtgxSgQRraKid7T2Vrqte3vdeUU_2DudhtesljHd9yrbnQphNtVZ3tVWuopnEMqWTw9fb4FH2NIcTaP1eKGWqMERXge8DnNM8Zg_WxQIlprGAcLKP2NTP7MbMKff8Het_tv_I_Z-iXqQ |
| CitedBy_id | crossref_primary_10_2478_amns_2025_0398 |
| Cites_doi | 10.1145/2633600 10.3390/info11120576 10.1007/978-3-642-19571-6 10.1007/978-3-642-13190-5 10.1377/hlthaff.16.3.146 10.1145/2043556.2043566 10.1109/SP.2017.10 10.1007/978-3-642-22792-9 10.1007/3-540-44647-8 10.1007/978-3-540-78967-3 10.30837/rt.2022.2.209.14 10.30837/rt.2022.3.210.04 10.1016/j.ins.2013.11.021 10.3390/app11188781 10.1137/14095772X 10.1615/TelecomRadEng.v79.i12.20 10.1109/CSCloud.2017.47 10.5220/0006666100570067 10.1145/564691.564717 10.1145/2976749.2978351 10.1145/3385658.3385668 10.1007/978-3-540-70936-7 10.1007/b136415 10.1145/1666420.1666444 10.30837/rt.2019.3.198.09 10.1145/2730908 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS DOA |
| DOI | 10.3390/app132011525 |
| DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Sciences (General) |
| EISSN | 2076-3417 |
| ExternalDocumentID | oai_doaj_org_article_87355aa1ba204f63a8a69047b6dc0649 A771909993 10_3390_app132011525 |
| GeographicLocations | Germany Ukraine |
| GeographicLocations_xml | – name: Ukraine – name: Germany |
| GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC TUS ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c406t-82615272f7a3e9986a9e916afb77be3edd6bd863388bbe18efc3a02e59a24fb83 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001090527200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2076-3417 |
| IngestDate | Mon Nov 10 04:35:32 EST 2025 Sun Nov 30 04:12:54 EST 2025 Tue Nov 04 18:42:27 EST 2025 Sat Nov 29 07:12:52 EST 2025 Tue Nov 18 22:36:58 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 20 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c406t-82615272f7a3e9986a9e916afb77be3edd6bd863388bbe18efc3a02e59a24fb83 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-1977-7269 0000-0002-8846-332X 0000-0003-1323-0801 0000-0001-5381-9528 |
| OpenAccessLink | https://doaj.org/article/87355aa1ba204f63a8a69047b6dc0649 |
| PQID | 2882389534 |
| PQPubID | 2032433 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_87355aa1ba204f63a8a69047b6dc0649 proquest_journals_2882389534 gale_infotracacademiconefile_A771909993 crossref_citationtrail_10_3390_app132011525 crossref_primary_10_3390_app132011525 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-10-01 |
| PublicationDateYYYYMMDD | 2023-10-01 |
| PublicationDate_xml | – month: 10 year: 2023 text: 2023-10-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Applied sciences |
| PublicationYear | 2023 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | Yesin (ref_34) 2020; 79 Gentry (ref_16) 2010; 53 ref_14 ref_35 ref_12 ref_33 ref_10 ref_32 ref_31 ref_30 Abadi (ref_1) 2020; 48 Garg (ref_20) 2016; 45 Brakerski (ref_19) 2014; 6 ref_18 ref_17 ref_39 ref_38 ref_15 ref_37 Atchinson (ref_5) 1997; 16 Liu (ref_13) 2014; 265 ref_25 Yesin (ref_8) 2022; 3 ref_24 ref_23 ref_22 ref_21 ref_43 ref_42 ref_41 ref_40 ref_3 ref_2 ref_29 ref_28 ref_27 ref_26 ref_9 Kamara (ref_11) 2015; 21 Hartel (ref_6) 2014; 47 ref_4 Yesin (ref_36) 2019; 198 Yesin (ref_7) 2022; 2 |
| References_xml | – volume: 6 start-page: 1 year: 2014 ident: ref_19 article-title: (Leveled) fully homomorphic encryption without bootstrapping publication-title: ACM Trans. Comput. Theory doi: 10.1145/2633600 – volume: 47 start-page: 1 year: 2014 ident: ref_6 article-title: A survey of provably secure searchable encryption publication-title: ACM Comput. Surv. (CSUR) – ident: ref_30 – ident: ref_37 doi: 10.3390/info11120576 – ident: ref_32 – ident: ref_3 – ident: ref_21 doi: 10.1007/978-3-642-19571-6 – ident: ref_17 doi: 10.1007/978-3-642-13190-5 – volume: 16 start-page: 146 year: 1997 ident: ref_5 article-title: From the field: The politics of the health insurance portability and accountability act publication-title: Health Aff. doi: 10.1377/hlthaff.16.3.146 – ident: ref_26 doi: 10.1145/2043556.2043566 – ident: ref_2 doi: 10.1109/SP.2017.10 – ident: ref_18 doi: 10.1007/978-3-642-22792-9 – ident: ref_39 – ident: ref_40 – ident: ref_24 doi: 10.1007/3-540-44647-8 – ident: ref_14 – ident: ref_23 doi: 10.1007/978-3-540-78967-3 – ident: ref_42 – volume: 2 start-page: 138 year: 2022 ident: ref_7 article-title: Research on the main methods and schemes of encryption with search capability publication-title: Radiotekhnika doi: 10.30837/rt.2022.2.209.14 – ident: ref_35 – volume: 3 start-page: 53 year: 2022 ident: ref_8 article-title: Researching basic searchable encryption schemes in databases that support SQL publication-title: Radiotekhnika doi: 10.30837/rt.2022.3.210.04 – volume: 265 start-page: 176 year: 2014 ident: ref_13 article-title: Search pattern leakage in searchable encryption: Attacks and new construction publication-title: Inf. Sci. doi: 10.1016/j.ins.2013.11.021 – ident: ref_33 doi: 10.3390/app11188781 – volume: 45 start-page: 882 year: 2016 ident: ref_20 article-title: Candidate indistinguishability obfuscation and functional encryption for all circuits publication-title: SIAM J. Comput. doi: 10.1137/14095772X – volume: 79 start-page: 1029 year: 2020 ident: ref_34 article-title: Monitoring the integrity and authenticity of stored database objects publication-title: Telecommun. Radio Eng. doi: 10.1615/TelecomRadEng.v79.i12.20 – ident: ref_10 doi: 10.1109/CSCloud.2017.47 – ident: ref_4 – ident: ref_31 – ident: ref_9 doi: 10.5220/0006666100570067 – ident: ref_28 doi: 10.1145/564691.564717 – ident: ref_29 – ident: ref_27 – ident: ref_15 doi: 10.1145/2976749.2978351 – ident: ref_12 – volume: 48 start-page: 44 year: 2020 ident: ref_1 article-title: The Seattle Report on Database Research publication-title: ACM Sigmod Rec. doi: 10.1145/3385658.3385668 – ident: ref_22 doi: 10.1007/978-3-540-70936-7 – ident: ref_41 – ident: ref_25 doi: 10.1007/b136415 – volume: 53 start-page: 97 year: 2010 ident: ref_16 article-title: Computing arbitrary functions of encrypted data publication-title: Commun. ACM doi: 10.1145/1666420.1666444 – volume: 198 start-page: 113 year: 2019 ident: ref_36 article-title: Some approach to data masking as means to counter the inference threat publication-title: Radiotekhnika doi: 10.30837/rt.2019.3.198.09 – ident: ref_38 – ident: ref_43 – volume: 21 start-page: 30 year: 2015 ident: ref_11 article-title: Encrypted search publication-title: XRDS doi: 10.1145/2730908 |
| SSID | ssj0000913810 |
| Score | 2.262138 |
| Snippet | The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due... |
| SourceID | doaj proquest gale crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 11525 |
| SubjectTerms | Confidentiality Data encryption Data integrity Data security database management system (DBMS) encryption Methods Queries searchable encryption security Servers Software Structured Query Language-SQL Usability |
| SummonAdditionalLinks | – databaseName: Publicly Available Content Database dbid: PIMPY link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwEB2VLQd6oLSAutAiH0CAUNQkdmLnhPpBBQiqRRSpnKyx46BK1e6yGyr133cm8S7toT31mszB0Xhm3jjj9wBe565wLnNVkmPRJKpJiwSlo3BXKaJJDdUM34lN6ONjc3pajeL16Hkcq1zkxC5R92zPPLdNSXi3nng-Md_NCRhSqS2k-jj9m7CGFP9rjYIaD2CVibfMAFZHX76Pfi_PXJgD02RpP_8uqdvnv8R8hzhjFaAblakj8L8tTXe152j9flf9BB5HDCr2-k2zASthvAlr15gJN2EjxvxcvIvE1O-fwteTBeGrIKgr-kllMheH2KI4GwsUB7PLaduzYLP3zy_FqCeCCLX4-eNbZ8mF8xn8Ovp0cvA5iVoMiaeS3ybUhbAAbt5olIFatBKrQMgSG6e1CzLUdelqU1LDa5wLmQmNl5jmoagwV40z8jkMxpNx2ALhqaksstqEYJSqsTEpqqJSmdfOO4X5ED4s_GB9JCpnvYxzSw0Le81e99oQ3iytpz1Bxy12--zSpQ3TancPJrM_NkapNZrgF2LmME9VU0o0WFap0q6sPWG3aghveUNYDn5aksd4h4E-jGm07J7WBLAIc8shbC82hI1ZYW7_-__F3a9fwiOWte-HBrdh0M7-hR146C_as_nsVdzWVz7gBzY priority: 102 providerName: ProQuest |
| Title | Technique for Searching Data in a Cryptographically Protected SQL Database |
| URI | https://www.proquest.com/docview/2882389534 https://doaj.org/article/87355aa1ba204f63a8a69047b6dc0649 |
| Volume | 13 |
| WOSCitedRecordID | wos001090527200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: PIMPY dateStart: 20110101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS-RAEC4Wdw96kPWFo670YUVFgkm6k-4c1VVW0SG-QE9NdacDAzLKTBT891anMzIexIvHhDp06tFVH6n6CuBvajJjElNEKWZ1JOo4i5AbCncRI6pYUc6w7bIJ2e-ru7uinFr15XvCAj1wUNy-kpQRERODaSzqnKNCAnRCmryylE7b0T2qeqbAVHsHF4mnrgqd7pxwvf8f7KeFE7_v50MOaqn6P7uQ2yxz8hvmu_KQHYRjLcAPN1yEuSnSwEVY6MJxzHY6zujdJTi7mXCxMqpCWWgiJnH2DxtkgyFDdjR6fWoCQbU3zMMrKwNHg6vY9eV5K-lz2jLcnhzfHP2PujUJkaVs3EQEEPxu2rSWyB2hpxwLR0Uf1kZK47irqtxUKicsqoxxiXK15RinLiswFbVRfAVmho9DtwrMEt7Lkko5p4SosFYxiqwQiZXGGoFpD_YmitO24xD3qyweNGEJr2Y9reYebL1LPwXujE_kDr0N3mU843X7gvxAd36gv_KDHmx7C2ofl3Qki914AX2YZ7jSB1JS7UPlMO_BxsTIugvYsU4JaVDtlnGx9h2nWYdZv5c-dP1twEwzenZ_4Jd9aQbj0Sb8PDzul1ebrc_SU3l6Ud6_AVlz7pc |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VLRLlUGhpxdICPlABQhGJ7STOAaHSUnXpdrWIRWpPZuw4qFK1u-wG0P4pfiPjfCzlUG49cE1GURw_z7yJx28AnnETGxOZLOAYF4EswjhAYWi5yxBRhYpihq2aTaSDgTo7y4Yr8Ks9C-PLKlufWDnqfGL9P_LXnKggBddYyLfTb4HvGuV3V9sWGjUsTtziJ6Vs8ze9Q5rfPc6P3o8OjoOmq0BgKXiVAfFp38qVFykKR8lGgpkjjoSFSVPjhMvzxOQqodRNGeMi5QorMOQuzpDLwihBz70Fq5LArjqwOuydDs-Xf3W8yqaKwrrCXogs9PvQ_pRy5PsM_RX7qhYB1wWCKrod3fvfvst9WG94NNuvgb8BK268CXevqCtuwkbjt-bsRSOu_fIBfBi1orWM6Dqrq63JnB1iiexizJAdzBbTslby9gi-XLBhLWbhcvbpY7-y9MF_Cz7fyAi3oTOejN1DYJYS4zjKlXNKyhwLFaKMMxnZ1FgjkXfhVTvT2jZi677nx6WmpMvjQl_FRRf2ltbTWmTkGrt3HjRLGy8NXl2YzL7qxtNolRKFRIwM8lAWiUCFSRbK1CS5Jf6ZdeG5h5z2DoxeyWJzDoMG5qXA9H6aEkmkvEF0YbeFnG4821z_wdujf99-CneOR6d93e8NTnZgjRM5rIsgd6FTzr67x3Db_igv5rMnzSJi8OWm8fkbhspZ2A |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3BbtQwEB2VLULlALRQsVDABypAKGpiO4lzQKh0WbG0rIJopXIKY8dBlardZTeA9tf4OsaJs5RDufXANRlFcfw88yYevwF4ynWsdaSzgGNcBbIK4wCFpuUuQ0QVKooZpmk2kY7H6vQ0y9fgV3cWxpVVdj6xcdTl1Lh_5HucqCAF11jIvcqXReSD4evZt8B1kHI7rV07jRYih3b5k9K3xavRgOZ6l_Ph2-ODd4HvMBAYCmR1QNzatXXlVYrCUuKRYGaJL2Gl01RbYcsy0aVKKI1TWttI2coIDLmNM-Sy0krQc6_BOlFyKXuwno8-5J9Xf3ic4qaKwrbaXogsdHvS7sRy5HoO_RUHm3YBlwWFJtINb__P3-gO3PL8mu23C2IT1uxkC25eUF3cgk3vzxbsuRfdfnEX3h93YraMaDxrq7DJnA2wRnY2YcgO5stZ3Sp8O2SfL1neilzYkn36eNRYOlJwD06uZITb0JtMJ_Y-MEMJcxyVylolZYmVClHGmYxMqo2WyPvwspv1wngRdtcL5LygZMxhpLiIkT7srqxnrfjIJXZvHIBWNk4yvLkwnX8tvAcqVErUEjHSyENZJQIVJlkoU52Uhnhp1odnDn6Fc2z0Sgb9-QwamJMIK_bTlMgj5ROiDzsd_Arv8RbFH-w9-PftJ3CDQFkcjcaHD2GDE2dsayN3oFfPv9tHcN38qM8W88d-PTH4ctXw_A1WzWKZ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Technique+for+Searching+Data+in+a+Cryptographically+Protected+SQL+Database&rft.jtitle=Applied+sciences&rft.au=Yesin%2C+Vitalii&rft.au=Karpinski%2C+Mikolaj&rft.au=Yesina%2C+Maryna&rft.au=Vilihura%2C+Vladyslav&rft.date=2023-10-01&rft.pub=MDPI+AG&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=13&rft.issue=20&rft_id=info:doi/10.3390%2Fapp132011525&rft.externalDocID=A771909993 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |