Generic Attacks on Secure Outsourced Databases

@inproceedings{Kellaris2016GenericAO,
  title={Generic Attacks on Secure Outsourced Databases},
  author={Georgios Kellaris and George Kollios and Kobbi Nissim and Adam O'Neill},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2016}
}
Recently, various protocols have been proposed for securely outsourcing database storage to a third party server, ranging from systems with "full-fledged" security based on strong cryptographic primitives such as fully homomorphic encryption or oblivious RAM, to more practical implementations based on searchable symmetric encryption or even on deterministic and order-preserving encryption. On the flip side, various attacks have emerged that show that for some of these protocols confidentiality… CONTINUE READING
Highly Cited
This paper has 60 citations. REVIEW CITATIONS
Tweets
This paper has been referenced on Twitter 1 time. VIEW TWEETS

Citations

Publications citing this paper.
Showing 1-10 of 38 citations

61 Citations

020402016201720182019
Citations per Year
Semantic Scholar estimates that this publication has 61 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

https: //cs.brown.edu/ ̃seny/slides/encryptedsearch-full.pdf

  • S. Kamara
  • How to search on encrypted data,
  • 2015
Highly Influential
9 Excerpts