- Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A. Order-preserving symmetric encryption. In EUROCRYPT (2009). Google ScholarDigital Library
- Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions. In Advances in Cryptology (CRYPTO) (2011). Google ScholarDigital Library
- Chen, A. GCreep: Google engineer stalked teens, spied on chats. Gawker (2010). http://gawker.com/5637234/.Google Scholar
- Chlipala, A. Static checking of dynamically-varying security policies in database-backed applications. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (2010). Google ScholarDigital Library
- Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (2010). Google ScholarDigital Library
- FIPS 197. Advanced Encryption Standard (AES). U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, 2011.Google Scholar
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (2009). Google ScholarDigital Library
- Gentry, C., Halevi, S., Smart, N.P. Homomorphic evaluation of the AES circuit. Cryptology ePrint Archive, Report 2012/099, 2012.Google Scholar
- Goldreich, O. Foundations of Cryptography: Volume I Basic Tools, Cambridge University Press, 2001. Google ScholarDigital Library
- Hacıgümüş, H., Iyer, B., Li, C., Mehrotra, S. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of ACM SIGMOD (2002). Google ScholarDigital Library
- Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th Usenix Security Symposium (2008). Google ScholarDigital Library
- Halevi, S., Rogaway, P. A tweakable enciphering mode. In Advances in Cryptology (CRYPTO) (2003).Google Scholar
- Homeland Security News Wire. Data breaches compromise nearly 8 million medical records, 2011.Google Scholar
- Li, J., Krohn, M., Mazières, D., Shasha, D. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (2004). Google ScholarDigital Library
- NIST. National Vulnerability Database. http://nvd.nist.gov.Google Scholar
- Oracle Corporation. Oracle advanced security. http://www.oracle.com/technetwork/database/options/advanced-security/.Google Scholar
- Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT (1999). Google ScholarDigital Library
- Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H. CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (2011). Google ScholarDigital Library
- Popa, R.A., Zeldovich, N. Cryptographic treatment of CryptDB's adjustable join. Technical Report MIT-CSA ILTR-2012-006, MIT Computer Science and Artificial Intelligence Laboratory, 2012.Google Scholar
- Quinn, B., Arthur, C. Playstation network hackers access data of 77 million users. The Guardian, 2011.Google Scholar
- Shi, E., Bethencourt, J., Chan, H., Song, D., Perrig, A. Multi-dimensional range query over encrypted data. In Proceedings of the IEEE Symposium on Security and Privacy (2007). Google ScholarDigital Library
- Song, D.X., Wagner, D., Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 21st IEEE Symposium on Security and Privacy (2000). Google ScholarDigital Library
- Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.F. Improving application security with data flow assertions. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (2009). Google ScholarDigital Library
Index Terms
- CryptDB: processing queries on an encrypted database
Recommendations
CryptDB: protecting confidentiality with encrypted query processing
SOSP '11: Proceedings of the Twenty-Third ACM Symposium on Operating Systems PrinciplesOnline applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that ...
On the Difficulty of Securing Web Applications Using CryptDB
BDCLOUD '14: Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud ComputingCrypt DB has been proposed as a practical and secure middleware to protect databases deployed on semi-honest cloud servers. While CD provides sufficient protection under Threat-1, here we demonstrate that when CD is deployed to secure the cloud hosted ...
Secure E-Voting System Implementation Using CryptDB
AbstractVoting process is important in any part of the world in public elections, private or autonomous bodies for electing someone. Due to the current pandemic situation, it is difficult to organize elections physically in the near future. Electronic ...
Comments