2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2013
DOI: 10.1109/cyberc.2013.12
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Querying Encrypted Data for Database as a Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…A general approach to data confidentiality is to secure the database using methods to maintain data privacy (Bajaj and Sion, 2014). A method with a growing interest is to use encrypted databases (Ravan et al, 2013) with proper access control and high assurance encryption standard. Protecting against privacy attacks, existing methods such as k -anonymity (Samarati and Sweeney, 1998; Zhong et al, 2005) can be utilized.…”
Section: Security Threatsmentioning
confidence: 99%
“…A general approach to data confidentiality is to secure the database using methods to maintain data privacy (Bajaj and Sion, 2014). A method with a growing interest is to use encrypted databases (Ravan et al, 2013) with proper access control and high assurance encryption standard. Protecting against privacy attacks, existing methods such as k -anonymity (Samarati and Sweeney, 1998; Zhong et al, 2005) can be utilized.…”
Section: Security Threatsmentioning
confidence: 99%
“…However, updating and querying secured data in the cloud may turn inefficient and expensive. Thus, specific end-to-end security approaches were designed for distributed/cloud databases (DBs) and data warehouses (DWs) [15,18]. The MONOMI system [20] notably encrypts both SQL queries and data with multiple cryptographic schemes.…”
Section: Introductionmentioning
confidence: 99%
“…This relationship should be non-linear so that decryption process is as tough as possible. The encryption process must be faster in time and cheaper in terms of the components involved [2]. CA provides a basic structure for highly parallel and complex operations upon which a basic encryption scheme can be built.…”
Section: A Encryption Phasementioning
confidence: 99%
“…Based on this paradigm, data owner manage the DBMS and answer to user's query directly, rather than traditional client-server architecture. One of the most serious obstacles to the prevalent use of DbaaS is related to security issues [2]. Attackers for data stored in database are not only from external parties but also from internal and their vulnerability to external attack increases.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation