A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Arx
2019
Proceedings of the VLDB Endowment
In this paper, we propose Arx, a practical and functionally rich database system that encrypts the data only with semantically secure encryption schemes. ...
In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data. ...
We propose Arx, a practical and functionally rich database system that takes an important step in this direction by always keeping the data encrypted with semantically secure encryption schemes. ...
doi:10.14778/3342263.3342641
fatcat:7rqpyv6n2rglth2h6wruknr4mu
Why Your Encrypted Database Is Not Secure
2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems - HotOS '17
In particular, the "snapshot attacker" model used to support the security claims for many encrypted databases does not reflect the information about past queries available in any snapshot attack on an ...
Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS's), use abstract threat models that capture neither realistic databases, nor realistic attack ...
Because index values are encrypted using standard encryption, the authors claim semantic security against snapshot attacks. ...
doi:10.1145/3102980.3103007
dblp:conf/hotos/GrubbsRS17
fatcat:e266jcb5bnhexi6b55iek36yqe
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data
[article]
2018
arXiv
pre-print
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. ...
of existing encryption-based approaches. ...
The query processing using Arx as efficient as cleartext version due to using an index, e.g., β values for Arx are 1.4 on system A and 2.5 on system B. ...
arXiv:1812.09233v1
fatcat:epxyephd75f5pc7x5se7vnt3iu
Micro-Benchmarking Property Preserving Encryption: Balancing Performance, Security and Functionality
2018
2018 29th Irish Signals and Systems Conference (ISSC)
This paper uses micro-benchmark to evaluate three interdependent factors of PPE: performance, security and functionality. ...
Experiments were performed using the CryptDB research system. Results validate the previous assessments of CryptDB and provide supplemental detail on performance, security and functionality. ...
Of the operations exercised here RND and HOM are categorised as secure as they provide (distinct-) semantic security [14] . ...
doi:10.1109/issc.2018.8585377
fatcat:s27bibltyvhrzjkbhdxtc7ouau
StealthDB: a Scalable Encrypted Database with Full SQL Query Support
2019
Proceedings on Privacy Enhancing Technologies
In this work we build StealthDB – an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU. ...
devices used. ...
StealthDB uses AES-CTR, a semantically secure encryption scheme to encrypt all the data items in the database. ...
doi:10.2478/popets-2019-0052
dblp:journals/popets/VinayagamurthyG19
fatcat:nosfqtk4k5ezlmqunuatpfuaqa
StealthDB: a Scalable Encrypted Database with Full SQL Query Support
[article]
2019
arXiv
pre-print
In this work we build StealthDB - an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU. ...
devices used. ...
StealthDB uses AES-CTR, a semantically secure encryption scheme to encrypt all the data items in the database. ...
arXiv:1711.02279v2
fatcat:ywqocsuulvbrviacjto5lltbce
Framework for Searchable Encryption with SQL Databases
2018
Proceedings of the 8th International Conference on Cloud Computing and Services Science
Whereas the literature mainly considers searching over an unstructured collection of files, this paper explores methods to execute SQL queries over encrypted databases. ...
We provide a complete framework that supports private search queries over encrypted SQL databases, in particular for PostgreSQL and MySQL databases. ...
In the case of SQL databases, the organization of data into SQL tables requires that each value in the tables is encrypted independently, using a semantically secure encryption algorithm. ...
doi:10.5220/0006666100570067
dblp:conf/closer/AzraouiOM18
fatcat:tnnecmfy7zhn3cdmlsfphjs5qe
Encrypted Shared Data Spaces
[chapter]
2008
Lecture Notes in Computer Science
Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. ...
An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given. ...
An attacker can alter the semantics of the data space operations. ...
doi:10.1007/978-3-540-68265-3_17
fatcat:p6ngrxujw5conmmh3thdwzdjei
A Practical Framework for Privacy-Preserving NoSQL Databases
2017
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)
For each technique, we provide an overview of its security model, along with an extensive set of experiments. ...
Recent work addressed this issue by extending databases to compute over encrypted data. ...
Each database request that is handled by a Cryp-toWorker is converted into an operation with the same semantics but with additional security guarantees. ...
doi:10.1109/srds.2017.10
dblp:conf/srds/MacedoPPPOMO17
fatcat:pcf7dvuo6rd7dhsxom25ule2ni
Secure and privacy preserving keyword searching for cloud storage services
2012
Journal of Network and Computer Applications
However, when a user wants to retrieve files containing certain keywords using a thin client, the adopted encryption system should not only support keyword searching over encrypted data, but also provide ...
To keep user data confidential against an untrusted CSP, a natural way is to apply cryptographic approaches, by disclosing the data decryption key only to authorized users. ...
Semantic security of the SPKS scheme We define security for the SPKS scheme in the sense of semantic security (Boneh and Franklin, 2003) . ...
doi:10.1016/j.jnca.2011.03.010
fatcat:7bamoavcmfbppe4tfl4tk75roi
Privacy-preserving Searchable Databases with Controllable Leakage
[article]
2019
arXiv
pre-print
We give security definition and analysis to show how P-McDb hides the aforementioned patterns. Finally, we implemented a prototype of P-McDb and test it using the TPC-H benchmark dataset. ...
In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leakage-based attacks. ...
even if the encrypted records are semantically secure. ...
arXiv:1909.11624v2
fatcat:xdaqn27rqrddjf2weqj373zd5e
In this paper, we introduce EncKV, an encrypted keyvalue store with secure rich query support. ...
To mitigate recent inference attacks on encrypted database systems, EncKV protects the order information during range queries, and presents an interactive batch query mechanism to further hide the associations ...
The security notion of EncKV's exact-match queries is stronger than deterministic encryption (DET), which is used in several existing encrypted databases [27] . ...
doi:10.1145/3052973.3052977
dblp:conf/ccs/YuanGWWLJ17
fatcat:fwxip6qhfjfvxmud5eaimjh6q4
Efficient confidentiality-preserving data analytics over symmetrically encrypted datasets
2020
Proceedings of the VLDB Endowment
We present two novel PHE schemes, an additive and a multiplicative homomorphic encryption scheme, which, unlike previous schemes, are symmetric. ...
To mitigate these concerns, several authors have proposed to use partially homomorphic encryption (PHE) to achieve practical levels of confidentiality while enabling computations in the cloud. ...
Arx introduces the ArxEq and ArxRange primitives that enable equality and range computations over data encrypted using semantically secure encryption. ...
doi:10.14778/3389133.3389144
fatcat:gitsjblemfcfthez27jdtrfigi
A Comprehensive Analysis On Efficient Multimedia Storage Mechanism In Public Cloud Environment With Secured Access
2021
Turkish Journal of Computer and Mathematics Education
In this paper, an ample analysis is presented on file storage encompassing fragmentation, compression, encryption security concerns in cloud storage and access. ...
The limitations in the existing is also provided and hence outlined the research direction towards an efficient storage mechanism with a secured access providing a reliable media data transmission between ...
To establish flexible cloud storage model, file virtualization solution is used so-called ARX cloud extender, a software which is installed in the windows based web server. ...
doi:10.17762/turcomat.v12i5.1794
fatcat:v37hz23khbhzlnz7tccy2sfsly
D3.1 – TheFSM Open Reference Architecture
2021
Zenodo
Also, the dataset will be stored in an encrypted format to the platform's database. ...
Part of the secure storage. ○ Users and roles database: This database is responsible for storing all users, their passwords (encrypted for extra security) and their corresponding roles. ...
The Food Safety Market: An SME-powered industrial data platform to boost the competitiveness of European ...
doi:10.5281/zenodo.5074927
fatcat:osv6pgucdvbphh43cooonngz6q
« Previous
Showing results 1 — 15 out of 64 results