Technique for Searching Data in a Cryptographically Protected SQL Database

The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms th...

Full description

Saved in:
Bibliographic Details
Published in:Applied sciences Vol. 13; no. 20; p. 11525
Main Authors: Yesin, Vitalii, Karpinski, Mikolaj, Yesina, Maryna, Vilihura, Vladyslav, Kozak, Ruslan, Shevchuk, Ruslan
Format: Journal Article
Language:English
Published: Basel MDPI AG 01.10.2023
Subjects:
ISSN:2076-3417, 2076-3417
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms that provide the ability to effectively use encryption to protect data. However, the use of traditional encryption methods faces a problem. Namely, traditional encryption, by making it impossible for insiders and outsiders to access data without knowing the keys, excludes the possibility of searching. This paper presents a solution that provides a strong level of confidentiality when searching, inserting, modifying, and deleting the required sensitive data in a remote database whose data are encrypted. The proposed SQL query processing technique allows the DBMS server to perform search functions over encrypted data in the same way as in an unencrypted database. This is achieved through the organization of automatic decryption by specially developed secure software of the corresponding data required for search, without the possibility of viewing these data itself. At that, we guarantee the integrity of the stored procedures used and special tables that store encrypted modules of special software and decryption keys, the relevance and completeness of the results returned to the application. The results of the analysis of the feasibility and effectiveness of the proposed solution show that the proper privacy of the stored data can be achieved at a reasonable overhead.
AbstractList The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become a motivating start to developing mechanisms that provide the ability to effectively use encryption to protect data. However, the use of traditional encryption methods faces a problem. Namely, traditional encryption, by making it impossible for insiders and outsiders to access data without knowing the keys, excludes the possibility of searching. This paper presents a solution that provides a strong level of confidentiality when searching, inserting, modifying, and deleting the required sensitive data in a remote database whose data are encrypted. The proposed SQL query processing technique allows the DBMS server to perform search functions over encrypted data in the same way as in an unencrypted database. This is achieved through the organization of automatic decryption by specially developed secure software of the corresponding data required for search, without the possibility of viewing these data itself. At that, we guarantee the integrity of the stored procedures used and special tables that store encrypted modules of special software and decryption keys, the relevance and completeness of the results returned to the application. The results of the analysis of the feasibility and effectiveness of the proposed solution show that the proper privacy of the stored data can be achieved at a reasonable overhead.
Audience Academic
Author Kozak, Ruslan
Karpinski, Mikolaj
Vilihura, Vladyslav
Yesina, Maryna
Shevchuk, Ruslan
Yesin, Vitalii
Author_xml – sequence: 1
  givenname: Vitalii
  orcidid: 0000-0003-1977-7269
  surname: Yesin
  fullname: Yesin, Vitalii
– sequence: 2
  givenname: Mikolaj
  orcidid: 0000-0002-8846-332X
  surname: Karpinski
  fullname: Karpinski, Mikolaj
– sequence: 3
  givenname: Maryna
  surname: Yesina
  fullname: Yesina, Maryna
– sequence: 4
  givenname: Vladyslav
  surname: Vilihura
  fullname: Vilihura, Vladyslav
– sequence: 5
  givenname: Ruslan
  orcidid: 0000-0003-1323-0801
  surname: Kozak
  fullname: Kozak, Ruslan
– sequence: 6
  givenname: Ruslan
  orcidid: 0000-0001-5381-9528
  surname: Shevchuk
  fullname: Shevchuk, Ruslan
BookMark eNptkctOHDEQRS1EpABhlw9oKdsM8aPbjyUaCBCNFBCwtsru8oxHTbtxm8X8fQwTJBTFXrhUuueqyveYHI5pREK-MnomhKE_YJqY4JSxjncH5IhTJReiZerwQ_2ZnM7zltZjmNCMHpFfD-g3Y3x-wSak3NwjZL-J47q5gAJNHBtolnk3lbTOMG2ih2HYNbc5FfQF--b-bvWmdDDjF_IpwDDj6d_3hDz-vHxYXi9Wv69uluerhW-pLAvNZR1R8aBAoDFagkHDJASnlEOBfS9dr6UQWjuHTGPwAijHzgBvg9PihNzsffsEWzvl-AR5ZxNE-9ZIeW0hl-gHtFqJrgNgDjhtgxSgQRraKid7T2Vrqte3vdeUU_2DudhtesljHd9yrbnQphNtVZ3tVWuopnEMqWTw9fb4FH2NIcTaP1eKGWqMERXge8DnNM8Zg_WxQIlprGAcLKP2NTP7MbMKff8Het_tv_I_Z-iXqQ
CitedBy_id crossref_primary_10_2478_amns_2025_0398
Cites_doi 10.1145/2633600
10.3390/info11120576
10.1007/978-3-642-19571-6
10.1007/978-3-642-13190-5
10.1377/hlthaff.16.3.146
10.1145/2043556.2043566
10.1109/SP.2017.10
10.1007/978-3-642-22792-9
10.1007/3-540-44647-8
10.1007/978-3-540-78967-3
10.30837/rt.2022.2.209.14
10.30837/rt.2022.3.210.04
10.1016/j.ins.2013.11.021
10.3390/app11188781
10.1137/14095772X
10.1615/TelecomRadEng.v79.i12.20
10.1109/CSCloud.2017.47
10.5220/0006666100570067
10.1145/564691.564717
10.1145/2976749.2978351
10.1145/3385658.3385668
10.1007/978-3-540-70936-7
10.1007/b136415
10.1145/1666420.1666444
10.30837/rt.2019.3.198.09
10.1145/2730908
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/app132011525
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One
ProQuest Central
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList

CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_87355aa1ba204f63a8a69047b6dc0649
A771909993
10_3390_app132011525
GeographicLocations Germany
Ukraine
GeographicLocations_xml – name: Ukraine
– name: Germany
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c406t-82615272f7a3e9986a9e916afb77be3edd6bd863388bbe18efc3a02e59a24fb83
IEDL.DBID PIMPY
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001090527200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2076-3417
IngestDate Mon Nov 10 04:35:32 EST 2025
Sun Nov 30 04:12:54 EST 2025
Tue Nov 04 18:42:27 EST 2025
Sat Nov 29 07:12:52 EST 2025
Tue Nov 18 22:36:58 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 20
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c406t-82615272f7a3e9986a9e916afb77be3edd6bd863388bbe18efc3a02e59a24fb83
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1977-7269
0000-0002-8846-332X
0000-0003-1323-0801
0000-0001-5381-9528
OpenAccessLink https://www.proquest.com/publiccontent/docview/2882389534?pq-origsite=%requestingapplication%
PQID 2882389534
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_87355aa1ba204f63a8a69047b6dc0649
proquest_journals_2882389534
gale_infotracacademiconefile_A771909993
crossref_citationtrail_10_3390_app132011525
crossref_primary_10_3390_app132011525
PublicationCentury 2000
PublicationDate 2023-10-01
PublicationDateYYYYMMDD 2023-10-01
PublicationDate_xml – month: 10
  year: 2023
  text: 2023-10-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2023
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Yesin (ref_34) 2020; 79
Gentry (ref_16) 2010; 53
ref_14
ref_35
ref_12
ref_33
ref_10
ref_32
ref_31
ref_30
Abadi (ref_1) 2020; 48
Garg (ref_20) 2016; 45
Brakerski (ref_19) 2014; 6
ref_18
ref_17
ref_39
ref_38
ref_15
ref_37
Atchinson (ref_5) 1997; 16
Liu (ref_13) 2014; 265
ref_25
Yesin (ref_8) 2022; 3
ref_24
ref_23
ref_22
ref_21
ref_43
ref_42
ref_41
ref_40
ref_3
ref_2
ref_29
ref_28
ref_27
ref_26
ref_9
Kamara (ref_11) 2015; 21
Hartel (ref_6) 2014; 47
ref_4
Yesin (ref_36) 2019; 198
Yesin (ref_7) 2022; 2
References_xml – volume: 6
  start-page: 1
  year: 2014
  ident: ref_19
  article-title: (Leveled) fully homomorphic encryption without bootstrapping
  publication-title: ACM Trans. Comput. Theory
  doi: 10.1145/2633600
– volume: 47
  start-page: 1
  year: 2014
  ident: ref_6
  article-title: A survey of provably secure searchable encryption
  publication-title: ACM Comput. Surv. (CSUR)
– ident: ref_30
– ident: ref_37
  doi: 10.3390/info11120576
– ident: ref_32
– ident: ref_3
– ident: ref_21
  doi: 10.1007/978-3-642-19571-6
– ident: ref_17
  doi: 10.1007/978-3-642-13190-5
– volume: 16
  start-page: 146
  year: 1997
  ident: ref_5
  article-title: From the field: The politics of the health insurance portability and accountability act
  publication-title: Health Aff.
  doi: 10.1377/hlthaff.16.3.146
– ident: ref_26
  doi: 10.1145/2043556.2043566
– ident: ref_2
  doi: 10.1109/SP.2017.10
– ident: ref_18
  doi: 10.1007/978-3-642-22792-9
– ident: ref_39
– ident: ref_40
– ident: ref_24
  doi: 10.1007/3-540-44647-8
– ident: ref_14
– ident: ref_23
  doi: 10.1007/978-3-540-78967-3
– ident: ref_42
– volume: 2
  start-page: 138
  year: 2022
  ident: ref_7
  article-title: Research on the main methods and schemes of encryption with search capability
  publication-title: Radiotekhnika
  doi: 10.30837/rt.2022.2.209.14
– ident: ref_35
– volume: 3
  start-page: 53
  year: 2022
  ident: ref_8
  article-title: Researching basic searchable encryption schemes in databases that support SQL
  publication-title: Radiotekhnika
  doi: 10.30837/rt.2022.3.210.04
– volume: 265
  start-page: 176
  year: 2014
  ident: ref_13
  article-title: Search pattern leakage in searchable encryption: Attacks and new construction
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2013.11.021
– ident: ref_33
  doi: 10.3390/app11188781
– volume: 45
  start-page: 882
  year: 2016
  ident: ref_20
  article-title: Candidate indistinguishability obfuscation and functional encryption for all circuits
  publication-title: SIAM J. Comput.
  doi: 10.1137/14095772X
– volume: 79
  start-page: 1029
  year: 2020
  ident: ref_34
  article-title: Monitoring the integrity and authenticity of stored database objects
  publication-title: Telecommun. Radio Eng.
  doi: 10.1615/TelecomRadEng.v79.i12.20
– ident: ref_10
  doi: 10.1109/CSCloud.2017.47
– ident: ref_4
– ident: ref_31
– ident: ref_9
  doi: 10.5220/0006666100570067
– ident: ref_28
  doi: 10.1145/564691.564717
– ident: ref_29
– ident: ref_27
– ident: ref_15
  doi: 10.1145/2976749.2978351
– ident: ref_12
– volume: 48
  start-page: 44
  year: 2020
  ident: ref_1
  article-title: The Seattle Report on Database Research
  publication-title: ACM Sigmod Rec.
  doi: 10.1145/3385658.3385668
– ident: ref_22
  doi: 10.1007/978-3-540-70936-7
– ident: ref_41
– ident: ref_25
  doi: 10.1007/b136415
– volume: 53
  start-page: 97
  year: 2010
  ident: ref_16
  article-title: Computing arbitrary functions of encrypted data
  publication-title: Commun. ACM
  doi: 10.1145/1666420.1666444
– volume: 198
  start-page: 113
  year: 2019
  ident: ref_36
  article-title: Some approach to data masking as means to counter the inference threat
  publication-title: Radiotekhnika
  doi: 10.30837/rt.2019.3.198.09
– ident: ref_38
– ident: ref_43
– volume: 21
  start-page: 30
  year: 2015
  ident: ref_11
  article-title: Encrypted search
  publication-title: XRDS
  doi: 10.1145/2730908
SSID ssj0000913810
Score 2.262138
Snippet The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 11525
SubjectTerms Confidentiality
Data encryption
Data integrity
Data security
database management system (DBMS)
encryption
Methods
Queries
searchable encryption
security
Servers
Software
Structured Query Language-SQL
Usability
SummonAdditionalLinks – databaseName: Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NSwMxEB2keNCD2KpYrZKDoiKL3U26yR5rtYhIUVTwFvIJglRpV6H_3slmW-pBvHhdZiE7M8nMYyfvARwJYYXivTTBePuEuZwlWuNhWDBnaIHvZI5VYhN8NBIvL8X9ktRXmAmL9MDRcReCY0VUKtUq6zKfUyUUAjrGdW4NltPq6h52PUtgqjqDizRQV8VJd4q4PvwPDreF06D386MGVVT9vx3IVZUZbsJG3R6SflxWE1bcuAXrS6SBLWjW23FKTmvO6LMtuH2ac7ES7EJJHCJGc3KlSkVex0SRwWT2UUaC6hCYtxm5jxwNzpLHh7vKMtS0bXgeXj8NbpJaJiExWI3LBAFC0KbNPFfUIXrKVeGw6VNec64dddbm2oocsajQ2qXCeUNVN3O9QmXMa0F3oDF-H7tdINRYq7Xw3IiUeQQbpiis8qKrqciYS9twPnecNDWHeJCyeJOIJYKb5bKb23C8sP6I3Bm_2F2GGCxsAuN19QDzQNZ5IP_KgzachAjKsC9xSUbV1wvwwwLDlexzjr0PtsO0DZ15kGW9YacyQ6SBvVuPsr3_WM0-rAVd-jj114FGOfl0B7BqvsrX6eSwytVvYlTrtw
  priority: 102
  providerName: Directory of Open Access Journals
Title Technique for Searching Data in a Cryptographically Protected SQL Database
URI https://www.proquest.com/docview/2882389534
https://doaj.org/article/87355aa1ba204f63a8a69047b6dc0649
Volume 13
WOSCitedRecordID wos001090527200001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: PIMPY
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwEB3BLgc4AC0gtpSVDyBAKGoSe2P7hNrSChCsAhSpnCJ_okrV7nY3IPXfM5N4l3IoJ67JRHI09swbe_wewDOlvDJyUmTo75iJUInMWgyGWgTHNX5TBtGJTcjpVJ2e6jpdj16ltsp1TOwCdc_2TH3bGIT3_NzRjvleicAQU-2EizeLi4w0pOisNQlq3IQhEW-pAQzr95_q75s9F-LAVEXe979zrPbplJjuEBekAvRXZuoI_K8L013uOb73f0d9H-4mDMr2-0mzBTfCbBvuXGEm3IattOZX7GUipn71AD6crAlfGUJd1ncqozl7a1rDzmbMsMPl5aLtWbDJ--eXrO6JIIJnXz9_7CwpcT6Eb8dHJ4fvsqTFkDlM-W2GVQgJ4JZRGh6wRKuMDogsTbRS2sCD95X1qsKCV1kbChWi4yYvw0SbUkSr-CMYzOaz8BgYd95bq6J0qhARKxqntTdR5ZarUoRiBK_XfmhcIionvYzzBgsW8lpz1WsjeL6xXvQEHdfYHZBLNzZEq909mC9_NGmVNkoi_DKmsKbMRay4UabSuZC28g6xmx7BC5oQDS1-HJIz6Q4D_hjRaDX7UiLAQszNR7C7nhBNigqr5o__d_79-gncJln7vmlwFwbt8md4Crfcr_ZstRzD8OBoWn8Zd_sH4zTJfwORSQox
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9NAEB2VFIlyAFqoCBTYAxUgZGHvbry7B4RKS9XQNAoiSOW07JdRpSoJiQHlT_EbmfVHKIdy64GrPbZs7_PMm93ZNwBPpfTSiF6W4HgXCQ85T6xFZ6h4cEzhNTTwqtmEGA7l6akarcGvdi9MLKtsfWLlqP3UxTnyVxSpIAbXHuNvZt-S2DUqrq62LTRqWByH5U9M2Rav-wc4vruUHr4b7x8lTVeBxGHwKhPk07GVKy2EYQGTjdyogBzJFFYIG1jwPrde5pi6SWtDJkPhmElp6ClDeWElw_teg3WOYJcdWB_1T0afV7M6UWVTZmldYc-YSuM6dNylnMU-Q3_FvqpFwGWBoIpuh7f_t-9yB241PJrs1cDfhLUw2YKbF9QVt2Cz8VsL8rwR135xF96PW9FagnSd1NXWaE4OTGnI2YQYsj9fzspayTsi-HxJRrWYRfDk44dBZRmD_z34dCVvuA2dyXQS7gNhzntrZSGczHiBWZlTyptCppZJykPWhZftSGvXiK3Hnh_nGpOuiAt9ERdd2F1Zz2qRkUvs3kbQrGyiNHh1YDr_qhtPo6VACmlMZg1NeZEzI02uUi5s7h3yT9WFZxFyOjowfCRnmn0Y-GJRCkzvCYEkEfMG1oWdFnK68WwL_QdvD_59-gncOBqfDPSgPzx-CBsUyWFdBLkDnXL-PTyC6-5HebaYP25-IgJfrhqfvwGvSFpE
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Bb9MwFH4aHULjAGwwURjgAxMgFC2x3dg5IDRWKspGVcQmjZOxHRtNmtrSBlD_Gr-O58Qp4zBuO3BNXqI4_vze95Ln7wE8lbKUWvSyBOfbJ9zlPDEGnWHBnWUFXkMdr5tNiNFInp4W4zX41e6FCWWVrU-sHXU5teEb-R5FKojBtcf4no9lEeP-4PXsWxI6SIU_rW07jQYih275E9O3xathH-d6l9LB2-ODd0nsMJBYDGRVgtw6tHWlXmjmMPHIdeGQL2lvhDCOubLMTSlzTOOkMS6TzlumU-p6habcG8nwvtdgHSk55x1YHw8_jD-vvvAExU2ZpU21PWNFGv5Jhx3LWeg59FccrNsFXBYU6kg3uP0_v6M7cCvya7LfLIhNWHOTLbh5QXVxCzajP1uQ51F0-8VdeH_citkSpPGkqcJGc9LXlSZnE6LJwXw5qxqF74Ds8yUZNyIXriSfPh7VloEU3IOTKxnhNnQm04m7D4TZsjRGemFlxj1ma7YoSu1lapik3GVdeNnOurJRhD30AjlXmIwFjKiLGOnC7sp61oiPXGL3JgBoZRMkw-sD0_lXFT2QkgKppdaZ0TTlPmda6rxIuTB5aZGXFl14FuCngmPDR7I67s_AgQWJMLUvBJJHzCdYF3Za-Kno8RbqD_Ye_Pv0E7iBoFRHw9HhQ9igyBmb2sgd6FTz7-4RXLc_qrPF_HFcTwS-XDU8fwOCz2MF
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Technique+for+Searching+Data+in+a+Cryptographically+Protected+SQL+Database&rft.jtitle=Applied+sciences&rft.au=Yesin%2C+Vitalii&rft.au=Karpinski%2C+Mikolaj&rft.au=Yesina%2C+Maryna&rft.au=Vilihura%2C+Vladyslav&rft.date=2023-10-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=13&rft.issue=20&rft.spage=11525&rft_id=info:doi/10.3390%2Fapp132011525&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app132011525
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon