skip to main content
article
Free Access

On the encipherment of search trees and random access files

Published:01 March 1976Publication History
Skip Abstract Section

Abstract

The securing of information in indexed, random access files by means of privacy transformations must be considered as a problem distinct from that for sequential files. Not only must processing overhead due to encrypting be considered, but also threats to encipherment arising from updating and the file structure itself must be countered. A general encipherment scheme is proposed for files maintained in a paged structure in secondary storage. This is applied to the encipherment of indexes organized as B-trees; a B-tree is a particular type of multiway search tree. Threats to the encipherment of B-trees, especially relating to updating, are examined, and countermeasures are proposed for each. In addition, the effect of encipherment on file access and update, on paging mechanisms, and on files related to the enciphered index are discussed. Many of the concepts presented may be readily transferred to other forms of multiway index trees and to binary search trees.

References

  1. 1 BAYER, R., MCCREIGHT, E. Organization and maintenance of large ordered indexes. Acta Informatica 1, 3 (1972), 173-189.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 CARROLL, J.M., .4.ND MCLELLAND, P.M. Fast "infinite key" privacy transformations for resource sharing systems. Proc. AFIPS 1970 FJCC, Vol. 37, AFIPS Press, Montvale, N.J., pp. 223-230.Google ScholarGoogle Scholar
  3. 3 FABRY, R.S. Capability-based addressing. Comm. ACM 17, 7 (July 1974), 403-411. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 FEISTEL, H. Cryptography and computer privacy. Sci. Amer. 228, 5 (May, 1973), 15-23.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5 FRIEDMAN, T.D., AND I-IOFFMAN, L.J. Execution time requirements for encipherment programs. Comm. A CM 17, 8 (Aug. 1974), 445-449. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 KNUTH, D.E. The Art of Computer Programming, Vol. 3: Sorting ann Searching. Addison- Wesley, Reading, Mass., 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 MELLEN, G.E. Cryptology, computers, and common sense. Proc. AFIPS 1973 NCC, Vol. 42, AFIPS Press, Montvale, N.J., pp. 569-579.Google ScholarGoogle Scholar
  8. 8 SMITH, J.L., NOTZ, W.A., AND OSSECK, P.R. An experimental application of cryptology to a remotely accessed data system. Proc. ACM 27th Nat. Conf., 1972, pp. 282--297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 TURN, R. Privacy transformations for databank systems. Proc. AFIPS 1973 NCC, Vol. 42, AFIPS Press, Montvale, N.J., pp. 589-601.Google ScholarGoogle Scholar
  10. 10 WEDEKIND, H. On the relation of access paths in a data base system. In Data Base Management, J.W. Klimbie and K.L. Koffeman, Eds., North-Holland Pub. Co., Amsterdam; 1974, pp. 385-397.Google ScholarGoogle Scholar
  11. 11 WILKES, M.V. Time-Sharing Computer Systems. American Elsevier, London, 1971. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the encipherment of search trees and random access files

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Database Systems
          ACM Transactions on Database Systems  Volume 1, Issue 1
          Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
          March 1976
          88 pages
          ISSN:0362-5915
          EISSN:1557-4644
          DOI:10.1145/320434
          Issue’s Table of Contents

          Copyright © 1976 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 March 1976
          Published in tods Volume 1, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader