42 Hits in 2.2 sec

Secure E-Voting System Implementation Using CryptDB

Sridhar Vemula, Ram Mohan Rao Kovvur, Dyna Marneni
2021 SN Computer Science  
To ensure privacy, encryption techniques are widely being used in research. The purpose of the research here is to ensure security and reliability using CryptDB in Electronic voting process.  ...  The proposed systems does not reveal any information to the intruders at any level of polling system and hence the outcome of Voting process can be achieved using online system with Security, Confidentiality  ...  In our proposed e-voting system, we use a secure database CryptDB for storing election-related information so that not only it provides security but also it allows various other operations on data without  ... 
doi:10.1007/s42979-021-00613-9 fatcat:nz3fvc5hlbbw7adh2oyxuyhtde

An Overview on CryptDb and Word2vec Approaches

Hana Yousuf, Asma Qassem Al-Hamad, Said Salloum
2020 Advances in Science, Technology and Engineering Systems  
Without a doubt, this article calls for proper research that sheds light on the security features using CryptDB to prevent data theft and privacy breaches in the server.  ...  CryptDB is a functional system that provides security and confidentiality through a set of operations. The obvious confidentiality of these attacks is for applications supported by SQL databases.  ...  CryptDB-specific userdefined functions (UDFs) are also provided by CryptDB to the server, using which the server can use ciphertexts for specific functions [24] .  ... 
doi:10.25046/aj0505154 fatcat:zzs7mmrji5b5dnq3uaqw6xadty

Why Your Encrypted Database Is Not Secure

Paul Grubbs, Thomas Ristenpart, Vitaly Shmatikov
2017 Proceedings of the 16th Workshop on Hot Topics in Operating Systems - HotOS '17  
In particular, the "snapshot attacker" model used to support the security claims for many encrypted databases does not reflect the information about past queries available in any snapshot attack on an  ...  Encrypted databases, a popular approach to protecting data from compromised database management systems (DBMS's), use abstract threat models that capture neither realistic databases, nor realistic attack  ...  The authors thank the reviewers and attendees of HotOS for their insightful suggestions. The authors also thank Mayank Varia and Benjamin Fuller for comments on earlier drafts of this paper.  ... 
doi:10.1145/3102980.3103007 dblp:conf/hotos/GrubbsRS17 fatcat:e266jcb5bnhexi6b55iek36yqe

Big data management: Security and privacy concerns

Ibrahim A. Atoum, Computer and Information Sciences Department, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia, Ismail M. Keshta, Computer and Information Sciences Department, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia
2021 International Journal of Advanced and Applied Sciences  
This article presents some of the major concerns surrounding the application and use of Big Data about challenges of security and privacy of data stored on technological devices.  ...  Big data is a field that mainly deals with the extraction and systemic analysis of large data sets to help businesses discover trends.  ...  Acknowledgment The authors would like to acknowledge the support provided by AlMaarefa University while conducting this research work.  ... 
doi:10.21833/ijaas.2021.05.009 fatcat:npjxq4uiazg4hd7tlt7d2emmjm

Integrating Encrypted Cloud Database Services using Query Processing

Jadhav Sonali, B. M.
2016 International Journal of Computer Applications  
In today's environment the various vital information should need to be stored in more secured manner.  ...  It guarantees for data confidentiality by performing SQL operations over encrypted cloud databases.  ...  Whereas privacy and security policies monitors the organizations information system and standards, procedures and controls guidelines for preserving confidentiality ,integrity and availability of cloud  ... 
doi:10.5120/ijca2016911323 fatcat:3oy525qtg5gjbk5uihxlabgwri

Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)

Ulrich Haböck, Manuel Koschuch, Ines Kramer, Silvie Schmidt, Mathias Tausig
2018 Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security  
Searchable encryption (SE) allows to outsource data to the cloud in a secure way, whilst permitting search functionality on that encrypted data: the host is able to perform search queries on behalf of  ...  Searchitect provides a ready-to-use client-server infrastructure, which is expandable by custom SE schemes, the server being a configurable webservice offering searchable encryption as a service (SEaaS  ...  ACKNOWLEDGEMENTS Part of our work on the Searchitect project is funded by Netidee 3 (Internet Privatstiftung Austria), grant  ... 
doi:10.5220/0006789402910298 dblp:conf/iotbd/HabockKKST18 fatcat:fxijy5qjebdh7i72f6lwng7mcu

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
2015 Proceedings of the 5th International Conference on Cloud Computing and Services Science  
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services.  ...  The valuable transformation of organizations that adopt cloud computing is indisputably accompanied by a number of security threats that should be considered.  ...  ACKNOWLEDGEMENTS The research leading to these results has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 644814, the PaaSword project  ... 
doi:10.5220/0005489302060213 dblp:conf/closer/VerginadisMGSHP15 fatcat:ufkcxotuwzgrfc3rldabixxf5q

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers

Susan E. McGregor, Elizabeth Anne Watkins, Mahdi Nasrullah Al-Ameen, Kelly Caine, Franziska Roesner
2017 USENIX Security Symposium  
We find that the tools developed for the project were both highly useful and highly usable, motivating journalists to use the secure communication platforms provided instead of seeking workarounds.  ...  From these and other findings, we distill lessons for socio-technical systems with strong security requirements and identify opportunities for future work.  ...  Acknowledgements We are especially grateful to our interview participants and the ICIJ Data Team for providing us access to the survey data and images of their systems.  ... 
dblp:conf/uss/McGregorWACR17 fatcat:apv5lrssmfaj5m2gwsxrz3scyq

Database Encryption for Balance Between Performance and Security

André Gomes, Carla Santos, Cristina Wanzeller, Pedro Martins
2021 Journal of Information Assurance & Cybersecurity  
In an increasingly digital world, information security is a very recurring theme and a growing concern for companies.  ...  This involves the protection of data and confidential or non-confidential information of a company, which transit between all its sectors and between the organization and its stakeholders.  ...  Furthermore, we would like to thank the Research Centre in Digital Services (CISeD), the Polytechnic of Viseu for their support."  ... 
doi:10.5171/2021.614511 fatcat:wtu2oduxmfbttnnnf6y4bloxsa


Mohamad Soubra, Ömer Özgür Tanrıöver
2017 Mugla Journal of Science and Technology  
In this paper, we aim to present the recent security approaches and solutions proposed for cloud service providers and those provided by widely used cloud service providers.  ...  The provided information by the assessment may be potentially used by organizations in order to align their security policies with those of cloud service providers.  ...  systems, and Booz Allen Hamilton information security governance government considerations for the cloud computing environment.  ... 
doi:10.22531/muglajsci.355273 fatcat:f3jvrehqv5hp3lp7n6ff4zcvvu

Secure big data ecosystem architecture: challenges and solutions

Memoona J. Anwar, Asif Q. Gill, Farookh K. Hussain, Muhammad Imran
2021 EURASIP Journal on Wireless Communications and Networking  
The results of current study provide a review of the existing privacy and security challenges and solutions using the systematic literature review (SLR) approach.  ...  There is a need to study and provide complete end-to-end solutions that ensure security and privacy throughout the data lifecycle across the ecosystem beyond the boundary of an individual system or organizational  ...  Imran's work is supported by the Deanship of Scientific Research at King Saud University through research group project number RG-1435-051. Author details  ... 
doi:10.1186/s13638-021-01996-2 fatcat:frd33flhbrgkpafqs2itib5fzi


Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
To mitigate recent inference attacks on encrypted database systems, EncKV protects the order information during range queries, and presents an interactive batch query mechanism to further hide the associations  ...  Second, it leverages the latest practical primitives for searching over encrypted data, i.e., searchable symmetric encryption and order-revealing encryption, and provides encrypted indexes with guaranteed  ...  The first fully functional system is CryptDB [27] , which uses property-preserving encryption (PPE) schemes and a dedicated query planner [31] to support legacy SQL queries.  ... 
doi:10.1145/3052973.3052977 dblp:conf/ccs/YuanGWWLJ17 fatcat:fwxip6qhfjfvxmud5eaimjh6q4

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
2017 Journal of Grid Computing  
Specifically, the proposed framework involves a context-aware security model, the necessary policies enforcement mechanism along with a physical distribution, encryption and query middleware.  ...  Nevertheless, the significant and valuable transformation of organizations that adopt cloud computing is accompanied by a number of security threats that should be considered.  ...  CryptDB uses a novel scheme for order preserving encryption that leaks no information about the data besides order and thus allows sorting encrypted data securely.  ... 
doi:10.1007/s10723-017-9394-2 fatcat:agvko3g37nc4pcpzj3iy4v4axm

The computer for the 21st century: present security & privacy challenges

Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu, Jie Liu
2018 Journal of Internet Services and Applications  
In this paper, we address major challenges from areas that most afflict the UbiComp revolution: 1. Software Protection: weakly typed languages, polyglot software, and networked embedded systems. 2.  ...  Long-term Security: recent advances in cryptanalysis and quantum attacks. 3. Cryptography Engineering: lightweight cryptosystems and their secure implementation. 4.  ...  However, the information can be used for illicit purposes, just as computer systems are used for attacks.  ... 
doi:10.1186/s13174-018-0095-2 fatcat:ictrcm6ahng4hccfqeqh7surti

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves [article]

Benny Fuhry SAP Security Research
2020 arXiv   pre-print
Furthermore, the resulting code - and data - in the enclave is very small reducing the potential for security-relevant implementation errors and side-channel leakages.  ...  EncDBDB offers nine encrypted dictionaries, which provide different security, performance and storage efficiency tradeoffs for the data.  ...  Usage Guideline According to the security sensitivity of the data owner, an encrypted dictionary can be select per column.  ... 
arXiv:2002.05097v1 fatcat:dzpnpnrbgfdche6sqjse3sggqu
« Previous Showing results 1 — 15 out of 42 results