Filters








64 Hits in 2.6 sec

Arx

Rishabh Poddar, Tobias Boelter, Raluca Ada Popa
2019 Proceedings of the VLDB Endowment  
In this paper, we propose Arx, a practical and functionally rich database system that encrypts the data only with semantically secure encryption schemes.  ...  In recent years, encrypted databases have emerged as a promising direction that provides data confidentiality without sacrificing functionality: queries are executed on encrypted data.  ...  We propose Arx, a practical and functionally rich database system that takes an important step in this direction by always keeping the data encrypted with semantically secure encryption schemes.  ... 
doi:10.14778/3342263.3342641 fatcat:7rqpyv6n2rglth2h6wruknr4mu

Why Your Encrypted Database Is Not Secure

Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017 Proceedings of the 16th Workshop on Hot Topics in Operating Systems - HotOS '17  
In particular, the "snapshot attacker" model used to support the security claims for many encrypted databases does not reflect the information about past queries available in any snapshot attack on an  ...  Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS's), use abstract threat models that capture neither realistic databases, nor realistic attack  ...  Because index values are encrypted using standard encryption, the authors claim semantic security against snapshot attacks.  ... 
doi:10.1145/3102980.3103007 dblp:conf/hotos/GrubbsRS17 fatcat:e266jcb5bnhexi6b55iek36yqe

Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data [article]

Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra
2018 arXiv   pre-print
Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge.  ...  of existing encryption-based approaches.  ...  The query processing using Arx as efficient as cleartext version due to using an index, e.g., β values for Arx are 1.4 on system A and 2.5 on system B.  ... 
arXiv:1812.09233v1 fatcat:epxyephd75f5pc7x5se7vnt3iu

Micro-Benchmarking Property Preserving Encryption: Balancing Performance, Security and Functionality

Daniel Becker, Andrew Hines
2018 2018 29th Irish Signals and Systems Conference (ISSC)  
This paper uses micro-benchmark to evaluate three interdependent factors of PPE: performance, security and functionality.  ...  Experiments were performed using the CryptDB research system. Results validate the previous assessments of CryptDB and provide supplemental detail on performance, security and functionality.  ...  Of the operations exercised here RND and HOM are categorised as secure as they provide (distinct-) semantic security [14] .  ... 
doi:10.1109/issc.2018.8585377 fatcat:s27bibltyvhrzjkbhdxtc7ouau

StealthDB: a Scalable Encrypted Database with Full SQL Query Support

Dhinakaran Vinayagamurthy, Alexey Gribov, Sergey Gorbunov
2019 Proceedings on Privacy Enhancing Technologies  
In this work we build StealthDB – an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU.  ...  devices used.  ...  StealthDB uses AES-CTR, a semantically secure encryption scheme to encrypt all the data items in the database.  ... 
doi:10.2478/popets-2019-0052 dblp:journals/popets/VinayagamurthyG19 fatcat:nosfqtk4k5ezlmqunuatpfuaqa

StealthDB: a Scalable Encrypted Database with Full SQL Query Support [article]

Alexey Gribov, Dhinakaran Vinayagamurthy, Sergey Gorbunov
2019 arXiv   pre-print
In this work we build StealthDB - an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU.  ...  devices used.  ...  StealthDB uses AES-CTR, a semantically secure encryption scheme to encrypt all the data items in the database.  ... 
arXiv:1711.02279v2 fatcat:ywqocsuulvbrviacjto5lltbce

Framework for Searchable Encryption with SQL Databases

Monir Azraoui, Melek Önen, Refik Molva
2018 Proceedings of the 8th International Conference on Cloud Computing and Services Science  
Whereas the literature mainly considers searching over an unstructured collection of files, this paper explores methods to execute SQL queries over encrypted databases.  ...  We provide a complete framework that supports private search queries over encrypted SQL databases, in particular for PostgreSQL and MySQL databases.  ...  In the case of SQL databases, the organization of data into SQL tables requires that each value in the tables is encrypted independently, using a semantically secure encryption algorithm.  ... 
doi:10.5220/0006666100570067 dblp:conf/closer/AzraouiOM18 fatcat:tnnecmfy7zhn3cdmlsfphjs5qe

Encrypted Shared Data Spaces [chapter]

Giovanni Russello, Changyu Dong, Naranker Dulay, Michel Chaudron, Maarten van Steen
2008 Lecture Notes in Computer Science  
Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data.  ...  An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given.  ...  An attacker can alter the semantics of the data space operations.  ... 
doi:10.1007/978-3-540-68265-3_17 fatcat:p6ngrxujw5conmmh3thdwzdjei

A Practical Framework for Privacy-Preserving NoSQL Databases

Ricardo Macedo, Joao Paulo, Rogerio Pontes, Bernardo Portela, Tiago Oliveira, Miguel Matos, Rui Oliveira
2017 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)  
For each technique, we provide an overview of its security model, along with an extensive set of experiments.  ...  Recent work addressed this issue by extending databases to compute over encrypted data.  ...  Each database request that is handled by a Cryp-toWorker is converted into an operation with the same semantics but with additional security guarantees.  ... 
doi:10.1109/srds.2017.10 dblp:conf/srds/MacedoPPPOMO17 fatcat:pcf7dvuo6rd7dhsxom25ule2ni

Secure and privacy preserving keyword searching for cloud storage services

Qin Liu, Guojun Wang, Jie Wu
2012 Journal of Network and Computer Applications  
However, when a user wants to retrieve files containing certain keywords using a thin client, the adopted encryption system should not only support keyword searching over encrypted data, but also provide  ...  To keep user data confidential against an untrusted CSP, a natural way is to apply cryptographic approaches, by disclosing the data decryption key only to authorized users.  ...  Semantic security of the SPKS scheme We define security for the SPKS scheme in the sense of semantic security (Boneh and Franklin, 2003) .  ... 
doi:10.1016/j.jnca.2011.03.010 fatcat:7bamoavcmfbppe4tfl4tk75roi

Privacy-preserving Searchable Databases with Controllable Leakage [article]

Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D Galbraith,, Giovanni Russello
2019 arXiv   pre-print
We give security definition and analysis to show how P-McDb hides the aforementioned patterns. Finally, we implemented a prototype of P-McDb and test it using the TPC-H benchmark dataset.  ...  In this work, first we define the leakage in searchable encrypted databases and analyse how the leakage is leveraged in existing leakage-based attacks.  ...  even if the encrypted records are semantically secure.  ... 
arXiv:1909.11624v2 fatcat:xdaqn27rqrddjf2weqj373zd5e

EncKV

Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
In this paper, we introduce EncKV, an encrypted keyvalue store with secure rich query support.  ...  To mitigate recent inference attacks on encrypted database systems, EncKV protects the order information during range queries, and presents an interactive batch query mechanism to further hide the associations  ...  The security notion of EncKV's exact-match queries is stronger than deterministic encryption (DET), which is used in several existing encrypted databases [27] .  ... 
doi:10.1145/3052973.3052977 dblp:conf/ccs/YuanGWWLJ17 fatcat:fwxip6qhfjfvxmud5eaimjh6q4

Efficient confidentiality-preserving data analytics over symmetrically encrypted datasets

Savvas Savvides, Darshika Khandelwal, Patrick Eugster
2020 Proceedings of the VLDB Endowment  
We present two novel PHE schemes, an additive and a multiplicative homomorphic encryption scheme, which, unlike previous schemes, are symmetric.  ...  To mitigate these concerns, several authors have proposed to use partially homomorphic encryption (PHE) to achieve practical levels of confidentiality while enabling computations in the cloud.  ...  Arx introduces the ArxEq and ArxRange primitives that enable equality and range computations over data encrypted using semantically secure encryption.  ... 
doi:10.14778/3389133.3389144 fatcat:gitsjblemfcfthez27jdtrfigi

A Comprehensive Analysis On Efficient Multimedia Storage Mechanism In Public Cloud Environment With Secured Access

G. Megala, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
In this paper, an ample analysis is presented on file storage encompassing fragmentation, compression, encryption security concerns in cloud storage and access.  ...  The limitations in the existing is also provided and hence outlined the research direction towards an efficient storage mechanism with a secured access providing a reliable media data transmission between  ...  To establish flexible cloud storage model, file virtualization solution is used so-called ARX cloud extender, a software which is installed in the windows based web server.  ... 
doi:10.17762/turcomat.v12i5.1794 fatcat:v37hz23khbhzlnz7tccy2sfsly

D3.1 – TheFSM Open Reference Architecture

Danai Vergeti, Iosif Angelidis, Dimitris Ntalaperas
2021 Zenodo  
Also, the dataset will be stored in an encrypted format to the platform's database.  ...  Part of the secure storage. ○ Users and roles database: This database is responsible for storing all users, their passwords (encrypted for extra security) and their corresponding roles.  ...  The Food Safety Market: An SME-powered industrial data platform to boost the competitiveness of European  ... 
doi:10.5281/zenodo.5074927 fatcat:osv6pgucdvbphh43cooonngz6q
« Previous Showing results 1 — 15 out of 64 results