Executing SQL over encrypted data in the database-service-provider model

@inproceedings{Hacigms2002ExecutingSO,
  title={Executing SQL over encrypted data in the database-service-provider model},
  author={Hakan Hacig{\"u}m{\"u}s and Balakrishna R. Iyer and Chen Li and Sharad Mehrotra},
  booktitle={SIGMOD '02},
  year={2002}
}
Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces… 

Figures from this paper

Concealed Data Aggregation Scheme for Multiple Application in Database as a Service Model
TLDR
This work applies CDAMA (Concealed Data Aggregation Scheme for Multiplicative Application) to understand aggregation query in Database-As-a-Service (DAS) model to process as much query as possible at the service providers’ site, without decrypting the data.
Query Execution over Encrypted Database
  • R. Kumar, M. Hussain
  • Computer Science
    2015 Second International Conference on Advances in Computing and Communication Engineering
  • 2015
TLDR
A system in which data stored at server site is in encrypted form and encrypted query is forwarded to server for processing, and the system is secured through symmetric key encryption and authentication using digital signature is proposed.
Database Management as a Service: Challenges and Opportunities
TLDR
A framework for efficient fault-tolerant scalable and theoretically secure privacy preserving data outsourcing that supports a diversity of database operations executed on different types of data, which can even leverage publicly available data sets.
Enforcing database security on cloud using a trusted third party based model
TLDR
In this research, a model that uses a trusted third party (TPP) to enforce the database security in the cloud is proposed and describes how a client processes a query securely by using encryption mechanisms and partitioning methods.
Protection Technique for Executing SQL over Encrypted Data in Database Outsourcing Service
TLDR
By implementing all the relational operators by using the unique selection operator on the server-side database with a constant number of elements in each time of selection, this proposal can defeat against the statistical attacks of the untrusted server compromising data confidentiality and user privacy.
Secure Database Service
TLDR
A novel paradigm for data management in which a third party service provider hosts database as a service, providing its customers seamless mechanisms to create, store, and access their databases at the host site is explored.
Securing SQL with Access Control for Database as a Service Model
TLDR
The proposed solution mitigates the limitations of CryptDB while keeping the efficiency of the service model used between ASP and DB intact and presents an improved solution for securing data in untrusted database provider.
Balancing confidentiality and efficiency in untrusted relational DBMSs
TLDR
This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content.
Using Multi Shares for Ensuring Privacy in Database-as-a-Service
  • M. Alzain, E. Pardede
  • Computer Science
    2011 44th Hawaii International Conference on System Sciences
  • 2011
TLDR
This paper proposes the architecture of a new model appropriate for Net DB2 architecture, known as NetDB2 Multi-Shares (NetDB2-MS), which is based on multi-service providers and a secret sharing algorithm instead of encryption, which is used by the existing NetDB 2 service.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 18 REFERENCES
Providing database as a service
We explore a novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and access
Practical techniques for searches on encrypted data
  • D. Song, D. Wagner, A. Perrig
  • Computer Science, Mathematics
    Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
  • 2000
TLDR
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
ON DATA BANKS AND PRIVACY HOMOMORPHISMS
TLDR
It appears likely that there exist encryption functions which permit encrypted data to be operated on without preliminary decryption of the operands, for many sets of interesting operations.
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
Database Systems: The Complete Book
TLDR
This introduction to database systems offers a readable comprehensive approach with engaging, real-world examples, and users will learn how to successfully plan a database application before building it.
Data Encryption Standard
TLDR
Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.
Accurate estimation of the number of tuples satisfying a condition
TLDR
A new method for estimating the number of tuples satisfying a condition of the type attribute rel constant, where rel is one of "=", ">", "<, "≥", "≤" , which gives highly accurate, yet easy to compute, estimates.
Histogram-Based Approximation of Set-Valued Query-Answers
A method for generating an approximate answer in response to a query to a database in which an SQL query Q for operating on a relation R in a database is received. Relation R has an associated
Database Systems Concepts
TLDR
This acclaimed revision of a classic database systems text provides the latest information combined with real-world examples to help readers master concepts in a technically complete yet easy-to-understand style.
Global optimization of histograms
TLDR
The idea of global optimization of histograms, i.e., single-attribute histograms for a set of attributes are optimized collectively so as to minimize the overall error in using the histograms is proposed.
...
1
2
...