SQL on Structurally-Encrypted Databases
نویسندگان
چکیده
We show how to encrypt a relational database in such a way that it can efficiently support alarge class of SQL queries. Our construction is based solely on structured encryption (STE) anddoes not make use of any property-preserving encryption (PPE) schemes such as deterministicand order-preserving encryption. As such, our approach leaks considerably less than PPE-basedsolutions which have recently been shown to reveal a lot of information in certain settings (Naveedet al., CCS ’15 ). Our construction is efficient and—under some conditions on the database andqueries—can have asymptotically-optimal query complexity. We also show how to extend oursolution to be dynamic while maintaining the scheme’s optimal query complexity. ∗[email protected]. Work done in part at Microsoft Research.†tarik [email protected]. Work done in part at Microsoft Research, IMT Atlantique and Colorado State.
منابع مشابه
SQL-Based Fuzzy Query Mechanism Over Encrypted Database
With the development of cloud computing and big data, data privacy protection has become an urgent problem to solve. Data encryption is the most effective way to protect privacy; however, it will change the data format and result in: 1. database structure and application software will be changed; 2. structured query language (SQL) operations cannot work properly, especially in SQL-based fuzzy q...
متن کاملNumerical SQL Value Expressions Over Encrypted Cloud Databases
Cloud databases often need client-side encryption. Encryption however impairs queries, especially with numerical SQL value expressions. Fully homomorphic encryption scheme could suffice, but known schemes remain impractical. Partially homomorphic encryption suffices for specific expressions only. The additively homomorphic Paillier scheme appears the most practical. We propose the homomorphic e...
متن کاملSQL Numerical Value Expressions Over Encrypted Cloud Databases
Cloud databases may need encryption. Encryption however impairs queries. Evaluating value expressions, especially the numerical ones, may be impossible in practice at present. Fully homomorphic encryption schemes remain impractical. The additively homomorphic Pailler cryptosystem seems practical for addition only value expressions. We propose a scheme derived from this encryption, supporting al...
متن کاملAnti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought of, such as disk scans, compromising the data by bypassing the database management system software or database user authentication processes. Or, when databases are provided as a service, the service providers may not...
متن کاملAggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, clients need to outsource their data to servers in encrypted form. At the same time, clients must still be able to execute queries over encrypted data. One prominent and fairly effective technique for executing SQL-sty...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016