Filters








67 Hits in 2.7 sec

Equi-Joins Over Encrypted Data for Series of Queries [article]

Masoumeh Shafieinejad
2021 arXiv   pre-print
In this paper, we present a new encryption scheme that can efficiently perform equi-joins over encrypted data with better security than the state-of-the-art.  ...  In particular, our encryption scheme reduces the leakage to equality of rows that match a selection criterion and only reveals the transitive closure of the sum of the leakages of each query in a series  ...  In summary, our contributions are as follows: • We provide a new encryption schemes for non-interactive equi-joins over encrypted data where a series of queries only leaks the transitive closure of the  ... 
arXiv:2103.05792v1 fatcat:fn5uet3mojayng3dytpibtygka

Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data

Hweehwa Pang, Xuhua Ding
2014 ACM Transactions on Database Systems  
In this article, we address the problem of running ad hoc equi-join queries directly on encrypted data in such a setting.  ...  This gives rise to the need to safeguard the privacy of the database as well as the user queries over it.  ...  We also thank Yanjiang Yang for discovering a security weakness in an earlier version.  ... 
doi:10.1145/2629501 fatcat:fpo2ip55yzbzphbjtugtz4qemu

Optimal Re-encryption Strategy for Joins in Encrypted Databases [chapter]

Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert
2013 Lecture Notes in Computer Science  
The problem is to select that column that will result in the minimum number of re-encryptions even under an unknown schedule of joins.  ...  In order to perform a join in a deterministically, adjustably encrypted database one has to re-encrypt at least one column.  ...  In these databases all data are encrypted at the client -where also the keys are exclusively stored -and queries are performed over encrypted data. In order to perform a selection, e.g.  ... 
doi:10.1007/978-3-642-39256-6_13 fatcat:lynliha2njcahgoalhaetz3kfq

T-DB: Toward Fully Functional Transparent Encrypted Databases in DBaaS Framework [article]

Xiaofei Wang National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing, P.R. China, School of Electronic and Information Engineering, Beihang University, Beijing, P.R. China)
2017 arXiv   pre-print
all types of queries on the encrypted database as usual; and the cloud can process ciphertext queries as if the database were not encrypted.  ...  A database owner outsources an encrypted database to a cloud platform, needing only to store the secret keys for encryption and an empty table header for the database; the database users can make almost  ...  More discussions are focused on executing Equi-Join query over encrypted data. In 2008, Li and Chen proposed a distributed privacypreserving Equi-Join protocol [51] .  ... 
arXiv:1708.08191v1 fatcat:q6cj3dy7mbaffj7mzql3vwhcma

Integrity for join queries in the cloud

Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2013 IEEE Transactions on Cloud Computing  
We address the problem of providing users with the ability to assess the integrity of join results produced by external computational providers and computed over externally stored databases.  ...  The application of the approach is completely transparent to the computational provider, against which data and query confidentiality are preserved.  ...  queries over external data.  ... 
doi:10.1109/tcc.2013.18 fatcat:2pqvg24lsjh2dfs4kwmw5hb3vm

Executing SQL queries over encrypted character strings in the Database-As-Service model

ZongDa Wu, GuanDong Xu, Zong Yu, Xun Yi, EnHong Chen, YanChun Zhang
2012 Knowledge-Based Systems  
in that SQL queries cannot be executed over the encrypted data immediately at the database service provider.  ...  Data privacy and security Encryption Two-phase query Characteristic index a b s t r a c t Rapid advances in the networking technologies have prompted the emergence of the "software as service" model for  ...  Acknowledgement We thank anonymous reviewers for their valuable comments. This material is based upon work funded by the Scientific Research  ... 
doi:10.1016/j.knosys.2012.05.009 fatcat:bz6jkr32yjemdjeu7lr2czvf7q

Inference Attacks on Property-Preserving Encrypted Databases

Muhammad Naveed, Seny Kamara, Charles V. Wright
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
The stateof-the-art EDB systems for relational databases can handle SQL queries over encrypted data and are competitive with commercial database systems.  ...  We present a series of attacks that recover the plaintext from DTE-and OPE-encrypted database columns using only the encrypted column and publicly-available auxiliary information.  ...  Acknowledgements The authors thank Josh Benaloh, Melissa Chase, and Tadayoshi Kohno for helpful conversations and encouragement during the early stages of this work.  ... 
doi:10.1145/2810103.2813651 dblp:conf/ccs/NaveedKW15 fatcat:un2nq7ss6bh33bs2jgtmpyvelu

SecureBlox

William R. Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, Molham Aref
2010 Proceedings of the 2010 international conference on Management of data - SIGMOD '10  
encrypted parallel hash join operation.  ...  Our implementation of Se-cureBlox is a series of extensions to LogicBlox, an emerging commercial Datalog-based platform for enterprise software systems.  ...  Our secure hash join algorithm performs a binary equi-join of two predicates of roughly equal size -one containing 900 tuples, and the other containing 800.  ... 
doi:10.1145/1807167.1807246 dblp:conf/sigmod/MarczakHBSLA10 fatcat:f6jy4fn4onayxmznp5mib44hnu

Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets [article]

Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
2021 arXiv   pre-print
applications (involving aggregation queries over selected regions over time windows) to users.  ...  Experimental results validate the efficiency of the proposed algorithms over a spatial time-series dataset (collected from a smart space) and TPC-H datasets, each of 136 Million rows, the size of which  ...  Also, spatial time-series data show new opportunities in terms of limited types of queries (i.e., not involving complex operations such as join and nested queries).  ... 
arXiv:2102.05238v1 fatcat:ciolzckxwzdt3eyqq4ch2baojy

Shrinkwrap

Johes Bater, Xi He, William Ehrich, Ashwin Machanavajjhala, Jennie Rogers
2018 Proceedings of the VLDB Endowment  
A private data federation is a set of autonomous databases that share a unified query interface offering in-situ evaluation of SQL queries over the union of the sensitive data of its members.  ...  We introduce Shrinkwrap, a private data federation that offers data owners a differentially private view of the data held by others to improve their performance over oblivious query processing.  ...  We also thank the HealthLNK team for sharing de-identified electronic health record data for this study.  ... 
doi:10.14778/3291264.3291274 fatcat:32upgt2bdfb3bc2c2diswsste4

Shrinkwrap: Differentially-Private Query Processing in Private Data Federations [article]

Johes Bater, Xi He, William Ehrich, Ashwin Machanavajjhala, Jennie Rogers
2018 arXiv   pre-print
A private data federation is a set of autonomous databases that share a unified query interface offering in-situ evaluation of SQL queries over the union of the sensitive data of its members.  ...  We introduce Shrinkwrap, a private data federation that offers data owners a differentially private view of the data held by others to improve their performance over oblivious query processing.  ...  Acknowledgments: We thank Abel Kho, Satyender Goel, Katie Jackson, Jess Joseph Behrens, and the HealthLNK team for their guidance and assistance with CAPriCORN and HealthLNK data.  ... 
arXiv:1810.01816v1 fatcat:lg4a56xs7vfnhmvwpiox3qqym4

Histograms as a side effect of data movement for big data

Zsolt Istvan, Louis Woods, Gustavo Alonso
2014 Proceedings of the 2014 ACM SIGMOD international conference on Management of data - SIGMOD '14  
This accelerator analyzes tables as they are transmitted from storage to the processing unit, and provides histograms on the data retrieved for queries at virtually no extra performance cost.  ...  Histograms are a crucial part of database query planning but their computation is resource-intensive.  ...  Acknowledgements This work is funded in part by grants from Xilinx, as part of the Enterprise Computing Center (www.ecc.ethz.ch), and Microsoft Research, as part of the Joint Research Center MSR-ETHZ-EPFL  ... 
doi:10.1145/2588555.2612174 dblp:conf/sigmod/IstvanWA14 fatcat:hkiti7hllfh7dgqtaguww7kgya

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

David W Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P Smart, Rebecca N Wright
2018 Computer journal  
For many decades this was perceived to be of purely theoretical interest, but now it has started to find application in a number of use cases.  ...  We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation.  ...  Some features of our query engine are not fully complete. For example, today JOIN operators can be processed only for plaintext or deterministically encrypted JOIN attributes.  ... 
doi:10.1093/comjnl/bxy090 fatcat:dnpklhzlcfca3autnp3wftkdya

SMCQL: Secure Querying for Federated Databases [article]

Johes Bater, Gregory Elliott, Craig Eggen, Satyender Goel, Abel Kho, Jennie Rogers
2017 arXiv   pre-print
In this context we propose the Private Data Network (PDN), a federated database for querying over the collective data of mutually distrustful parties.  ...  Despite this newfound abundance of data, progress has been slow in sharing it for open science, business, and other data-intensive endeavors.  ...  For joins, we handle equi-joins, theta joins, and cross products. At this time we do not support outer joins or set operations.  ... 
arXiv:1606.06808v5 fatcat:tlnmiqkhk5emdhvjscjhfznhce

Enabling Collaborative Data Authorization Between Enterprise Clouds [chapter]

Meixing Le, Krishna Kant, Sushil Jajodia
2013 Secure Cloud Computing  
The access is regulated by means of a set of authorization rules that may be defined using relational calculus, including joins over relations from multiple parties.  ...  We address the issues of detecting inconsistencies and methods for fixing them. We also discuss the question of enforceability (or adequacy) of the rules.  ...  Definition 1 A join path is the result of a series of join operations over a set of relations R 1 , R 2 ...R n with the specified equi-join predicates (A l1 , A r1 ), (A l2 , A r2 )...  ... 
doi:10.1007/978-1-4614-9278-8_7 fatcat:mv7sdrdyojfwfei6ebxdbrcbni
« Previous Showing results 1 — 15 out of 67 results