2018
DOI: 10.1186/s13174-017-0073-0
|View full text |Cite
|
Sign up to set email alerts
|

A framework for searching encrypted databases

Abstract: Cloud computing is a ubiquitous paradigm responsible for a fundamental change in the way distributed computing is performed. The possibility to outsource the installation, maintenance and scalability of servers, added to competitive prices, makes this platform highly attractive to the computing industry. Despite this, privacy guarantees are still insufficient for data processed in the cloud, since the data owner has no real control over the processing hardware. This work proposes a framework for database encry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Meanwhile, genotypes and phenotypes as well as a subset of the queries are protected from the public cloud and attackers. More precisely, we consider the following three threat models for database management [35,10]:…”
Section: Methodsmentioning
confidence: 99%
“…Meanwhile, genotypes and phenotypes as well as a subset of the queries are protected from the public cloud and attackers. More precisely, we consider the following three threat models for database management [35,10]:…”
Section: Methodsmentioning
confidence: 99%
“…Various attempts such as CryptDB [12] have been made regarding homomorphic encryption. CryptDB has proposed the idea of encrypt attributes at different levels, such as onion layers [16]. It also uses a reliable proxy server to store encryption keys, database schema and onion layers of all attributes.…”
Section: Homomorphic Encryption Based Methodsmentioning
confidence: 99%
“…In order to process the query, the proxy checks the required attributes and then considers the suitable layer. Consequently, it separates the onion layers dynamically, if necessary, and assigns data computation to the appropriate layer [16]. However, it is significant to note that the inner layers do not provide high level of security and are vulnerable to attacks.…”
Section: Homomorphic Encryption Based Methodsmentioning
confidence: 99%
“…[6] have proposed a framework for database encryption that preserves data secrecy on an un-trusted environment while performing searching on cloud database. They have employed order revealing encryption to perform selection operation on databases, and homomorphism to enable computation over cipher texts [6]. L. Arockiam et al (2013) have analyzed the issues involved in managing data privacy on the cloud.…”
Section: Review Of Literaturementioning
confidence: 99%