scispace - formally typeset
Search or ask a question

Showing papers on "Database encryption published in 2003"


Proceedings ArticleDOI
27 Oct 2003
TL;DR: This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content.
Abstract: The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes of primary importance to provide means of protecting the secrecy of the information, while guaranteeing its availability to legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations to external application service providers. A promising direction towards prevention of unauthorized access to outsourced data is represented by encryption. However, data encryption is often supported for the sole purpose of protecting the data in storage and assumes trust in the server, that decrypts data for query execution.In this paper, we present a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers. Our approach is based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Our indexes balance the trade off between efficiency requirements in query execution and protection requirements due to possible inference attacks exploiting indexing information. We also investigate quantitative measures to model inference exposure and provide some related experimental results.

388 citations


Journal Article
TL;DR: In order to offer a better key management strategy and a better access control scheme, a user identity code model is developed and by introducing it into the encryption system, the encryption key management can be enhanced and many problems in access control can be prevented effectively.
Abstract: This paper builds a center encryption server to provide centralized encryption services for entire database environment. This solution separates encryption keys from the encrypted data stored in the database and prevents intruders from stealing the crucial information. In order to offer a better key management strategy and a better access control scheme, a user identity code model is developed. By introducing the model into the encryption system, the encryption key management can be enhanced,and many problems in access control can be prevented effectively.

1 citations