scispace - formally typeset
Proceedings ArticleDOI

Complex Queries in a Shared Multi User Relational Cloud Database

Reads0
Chats0
TLDR
This paper tries to introduce a highly secure and flexible database encryption scheme allowing multiple users to perform more complex queries, including cross-table joins and still achieve acceptable performance by utilizing database's built-in indexing capabilities.
Abstract
While DaaS is becoming more and more popular enterprises start considering it as an option to reduce IT maintenance costs. But data privacy and security issues keep most of them from moving to the cloud. Existing schemes of encrypting the database usually either provide a very basic search only (e.g., SELECT * FROM t WHERE t.a = 5) and nothing more or give users more flexibility at a cost of data security. In this paper we try to introduce a highly secure and flexible database encryption scheme allowing multiple users to perform more complex queries, including cross-table joins and still achieve acceptable performance by utilizing database's built-in indexing capabilities. Several dedicated proxy servers in between the user and the database server help to achieve this and make it all transparent for the user. Developed solution shows acceptable performance level in most of the testing cases.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Transparent Data Encryption for Data-in-Use and Data-at-Rest in a Cloud-Based Database-as-a-Service Solution

TL;DR: This paper proposes a different approach to TDE, which takes into account cloud-specific risks, extends encryption to cover data-in-use and partly data- in-motion, and is capable of executing large subsets of SQL including heavy relational operations, complex operations over attributes, and transactions.
Proceedings ArticleDOI

A Confidentiality-Preserving Search Technique for Encrypted Relational Cloud Databases

TL;DR: A flexible database encryption scheme allowing multiple users to perform complex search-based queries, including cross-table joins, capable of utilizing database's indexing capabilities is proposed.
Proceedings ArticleDOI

Model of an Encrypted Cloud Relational Database Supporting Complex Predicates in WHERE Clause

TL;DR: A modular and extensible framework model of an encrypted database is introduced, which makes it possible to execute a wide range of queries, including those with complex arithmetic expressions, retaining data privacy even with an adversary gaining full access to the database server.
DissertationDOI

Privacy-preserving OLTP database systems with OLAP support

TL;DR: In this paper, the authors propose a method to solve the problem of "uniformity" and "uncertainty" in the context of health care, and propose a solution.
References
More filters
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Proceedings ArticleDOI

Executing SQL over encrypted data in the database-service-provider model

TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Journal ArticleDOI

Shared and searchable encrypted data for untrusted servers

TL;DR: This paper proposes an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data and supports keyword search which enables the server to return only the encrypted data that satisfies an encrypted query without decrypting it.

Internet Security Glossary, Version 2

TL;DR: The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026) following the principles that such writing should use the same term or definition whenever the same concept is mentioned.
Book ChapterDOI

Private query on encrypted data in multi-user settings

TL;DR: The results include a set of security notions for multi-user searchable encryption as well as a construction which is provably secure under the newly introduced security notions.
Related Papers (5)
Trending Questions (1)
How do I make SQL Server accessible remotely?

Several dedicated proxy servers in between the user and the database server help to achieve this and make it all transparent for the user.