Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data 2015
DOI: 10.1145/2723372.2749439
|View full text |Cite
|
Sign up to set email alerts
|

Enki

Abstract: A data owner outsourcing the database of a multi user application wants to prevent information leaks caused by outside attackers exploiting software vulnerabilities or by curious personnel. Query processing over encrypted data solves this problem for a single user, but provides only limited functionality in the face of access restrictions for multiple users and keys. ENKI is a system for securely executing queries over sensitive, access restricted data on an outsourced database. It introduces an encryption bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…The main shortcoming of these solutions is due to their evaluation costs (they rely on public key encryption), and not always easily and efficiently support access revocation. Approaches based on selective encryption (e.g., [15], [29], [30]) assume to encrypt each resource with a key that only authorized users know or can derive. In this scenario, policy updates are then either managed by the data owner, with considerable overhead, or delegated to the server through over-encryption [15], [29] or updatable encryption [31].…”
Section: Related Workmentioning
confidence: 99%
“…The main shortcoming of these solutions is due to their evaluation costs (they rely on public key encryption), and not always easily and efficiently support access revocation. Approaches based on selective encryption (e.g., [15], [29], [30]) assume to encrypt each resource with a key that only authorized users know or can derive. In this scenario, policy updates are then either managed by the data owner, with considerable overhead, or delegated to the server through over-encryption [15], [29] or updatable encryption [31].…”
Section: Related Workmentioning
confidence: 99%