formation revealed to DBMS. The cases NU and ZU
were very simple and straightforward, offering only
the information necessary for a query to be executed
and results generated. Thus, the control of DB up-
dates helps to maintain the RND layer values, which
do not expose any information (see Fig 2(D-F)). ZU
raised all RND values to 100 % , while NU is less
than ZU, it increased RND more than GU on the DB.
In all cases, the most obvious level of security hap-
pens in the ZU scenario.
5 EXPERIMENT & EVALUATION
The inward-adjustment time, outward-adjustment
time, and communication time on both the client-
side and server-side adjustments will be measured as
data size increases. Data encryption was performed
in three layers, in the following order: CP − ABE
DET OPE PLAIN. The testing datasets are se-
lected based on the number of documents: (i) 1,000
documents with 6,500 values; (ii) 2,000 documents
with 13,000 values; (iii) 5,000 documents with 32,500
values; and (iv) 10,000 documents with 65,000 val-
ues. SELECT,UPDATE,DELETE were all evaluated
using the same criteria as in Q1. It was tested 20
times. The prototype was written in Java and stored in
a local database (OrientDB). The machine utilised for
testing has 8 GB RAM and an i7-8565U CPU (1.99
GHz).
5.1 Performance Evaluation
Figure 3a illustrates the time required for inward ad-
justment execution, which rises linearly as the num-
ber of documents increases. However, the execution
time is equal for all cases. Figure 3b illustrates the
Outward-Adjustment execution time, with ZU out-
performing all other cases and GU taking the longest
time of them. Figure 3c illustrates the time required to
communicate with and retrieve data from a database.
GU communicated slowly and was the least effec-
tive of the three cases, while the ZU outward adjust-
ment outperformed the other two. Overall, in all three
cases, server-side adjustment outperforms client-side
adjustment.
6 RELATED WORK
The majority of research has focused on unmodified-
based DBMS for querying encrypted data. (Popa
et al., 2011; Waage and Wiese, 2017; Aburawi
et al., 2018b; Almarwani et al., 2019b) encrypt
data using multiple layers of encryption; thus, they
need adjustment techniques that enable more com-
puting classes. In a previous study, three types of
adjustment techniques were identified: SEA (Popa
et al., 2011), TAEA (Aburawi et al., 2018a), and
RAEA(Almarwani et al., 2020; Almarwani et al.,
2021). SEA performs adjustments prior to query ex-
ecution by adjusting all values of columns occurring
in query criteria to the encryption level based on the
class of computation contained in the expression col-
umn. CryptDB was the first to offer an adjustment
technique (SEA) for SQL, whereas CryptGraph (Abu-
rawi et al., 2018b) and SDDB (Almarwani et al.,
2019b; Almarwani et al., 2019a), respectively, ap-
ply the CryptDB transfer concept to graph databases
(Neo4j database) and document databases (Mon-
goDB). As SEA discloses more information than nec-
essary, Aburawi et al. (Aburawi et al., 2018a) pro-
posed TAEA for traversal queries for graph databases.
TAEA processes adjustments during query execu-
tion to limit the quantity of information required as
much as possible; this execution happens dynamically
based on node-to-node relationships. However, the
Document-Database lacks document-to-document re-
lationships, thus, TAEA is useless in such scenarios.
Almarwani et al (Almarwani et al., 2019b; Almarwani
et al., 2019a) suggested RAEA for conjunctive condi-
tions, as unlike TAEA, RAEA is concerned with lim-
iting the amount of information disclosed after query
conduction, a process based on restoring maximum
security levels. TAEA and RAEA both offer better
protection than SEA, but they create additional obsta-
cles, such as communication costs or disruptions to
adjustments in some cases; determining how to han-
dle these while enabling an appropriate trade-off be-
tween security, effectiveness, and amount of revealed
data is thus important.
7 CONCLUSION
This paper presented an overview of the RAEA ad-
justment techniques used to query encrypted data us-
ing Onion Layers Encryption. The main goal was
to identify the approach that best met the following
requirements: the approach had to (i) permit adjust-
ment at a lower cost of decryption/encryption; (ii)
permit adjustment with limited data updates; (iii) re-
duce communication costs; (iv) provide better secu-
rity by revealing only the required information to the
DBMS for each query; and (v) provide better perfor-
mance concerning query execution speed. This pa-
per thus presented both Sorted Criteria and Update-
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
312