skip to main content
research-article
Free Access

CryptDB: processing queries on an encrypted database

Authors Info & Claims
Published:01 September 2012Publication History
First page image

References

  1. Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A. Order-preserving symmetric encryption. In EUROCRYPT (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Advances in Cryptology (CRYPTO) (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chen, A. GCreep: Google engineer stalked teens, spied on chats. Gawker (2010). http://gawker.com/5637234/.Google ScholarGoogle Scholar
  4. Chlipala, A. Static checking of dynamically-varying security policies in database-backed applications. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. FIPS 197. Advanced Encryption Standard (AES). U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, 2011.Google ScholarGoogle Scholar
  7. Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gentry, C., Halevi, S., Smart, N.P. Homomorphic evaluation of the AES circuit. Cryptology ePrint Archive, Report 2012/099, 2012.Google ScholarGoogle Scholar
  9. Goldreich, O. Foundations of Cryptography: Volume I Basic Tools, Cambridge University Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hacıgümüş, H., Iyer, B., Li, C., Mehrotra, S. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of ACM SIGMOD (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th Usenix Security Symposium (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Halevi, S., Rogaway, P. A tweakable enciphering mode. In Advances in Cryptology (CRYPTO) (2003).Google ScholarGoogle Scholar
  13. Homeland Security News Wire. Data breaches compromise nearly 8 million medical records, 2011.Google ScholarGoogle Scholar
  14. Li, J., Krohn, M., Mazières, D., Shasha, D. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. NIST. National Vulnerability Database. http://nvd.nist.gov.Google ScholarGoogle Scholar
  16. Oracle Corporation. Oracle advanced security. http://www.oracle.com/technetwork/database/options/advanced-security/.Google ScholarGoogle Scholar
  17. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H. CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Popa, R.A., Zeldovich, N. Cryptographic treatment of CryptDB's adjustable join. Technical Report MIT-CSA ILTR-2012-006, MIT Computer Science and Artificial Intelligence Laboratory, 2012.Google ScholarGoogle Scholar
  20. Quinn, B., Arthur, C. Playstation network hackers access data of 77 million users. The Guardian, 2011.Google ScholarGoogle Scholar
  21. Shi, E., Bethencourt, J., Chan, H., Song, D., Perrig, A. Multi-dimensional range query over encrypted data. In Proceedings of the IEEE Symposium on Security and Privacy (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Song, D.X., Wagner, D., Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 21st IEEE Symposium on Security and Privacy (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.F. Improving application security with data flow assertions. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CryptDB: processing queries on an encrypted database

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 55, Issue 9
        September 2012
        104 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/2330667
        Issue’s Table of Contents

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 September 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format