Generic Attacks on Secure Outsourced Databases

  title={Generic Attacks on Secure Outsourced Databases},
  author={Georgios Kellaris and George Kollios and Kobbi Nissim and Adam O'Neill},
  booktitle={ACM Conference on Computer and Communications Security},
Recently, various protocols have been proposed for securely outsourcing database storage to a third party server, ranging from systems with "full-fledged" security based on strong cryptographic primitives such as fully homomorphic encryption or oblivious RAM, to more practical implementations based on searchable symmetric encryption or even on deterministic and order-preserving encryption. On the flip side, various attacks have emerged that show that for some of these protocols confidentiality… CONTINUE READING
Highly Cited
This paper has 60 citations. REVIEW CITATIONS
This paper has been referenced on Twitter 1 time. VIEW TWEETS


Publications citing this paper.
Showing 1-10 of 38 citations

61 Citations

Citations per Year
Semantic Scholar estimates that this publication has 61 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 13 references

https: // ̃seny/slides/encryptedsearch-full.pdf

  • S. Kamara
  • How to search on encrypted data,
  • 2015
Highly Influential
9 Excerpts