Skip to main content

Encryption over Semi-trusted Database

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5667))

Included in the following conference series:

Abstract

Encryption is a well established technology for protecting sensitive data, but developing a database encryption strategy must take many factors into consideration. In the case of semi trusted databases where the database contents are shared between many parties, using server-based encryption (server encrypts all data) or client-based encryption (client encrypts all data) is not sufficient to protect semi-trusted databases. In this paper we propose Mixed Cryptography Database (MCDB), a novel framework to encrypt semi-trusted databases over untrusted networks in a mixed form using many keys owned by different parties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bouganim, L., Pucheral, P.: Chip-secured data access: confidential data on untrusted servers. In: VLDB 2002: Proceedings of the 28th international conference on Very Large Data Bases, VLDB Endowment, pp. 131–142 (2002)

    Google Scholar 

  2. Chang, C.-C., Chan, C.-W.: A database record encryption scheme using the RSA public key cryptosystem and its master keys. In: ICCNMC 2003: Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing, p. 345. IEEE Computer Society, Washington (2003)

    Chapter  Google Scholar 

  3. Damiani, E., De Capitani Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 93–102. ACM, New York (2003)

    Google Scholar 

  4. Davida, G.I., Wells, D.L., Kam, J.B.: A database encryption system with subkeys. ACM Trans. Database Syst. 6(2), 312–328 (1981)

    Article  MathSciNet  Google Scholar 

  5. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: A data outsourcing architecture combining cryptography and access control. In: CSAW 2007: Proceedings of the 2007 ACM workshop on Computer security architecture, pp. 63–69. ACM, New York (2007)

    Chapter  Google Scholar 

  6. Ge, T., Zdonik, S.: Fast, secure encryption for indexing in a column-oriented DBMS. In: IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007, pp. 676–685 (2007)

    Google Scholar 

  7. Hacigumus, H., Mehrotra, S., Iyer, B.: Providing database as a service. In: International Conference on Data Engineering, p. 0029 (2002)

    Google Scholar 

  8. Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in RDBMS. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 147–164. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Jingmin, H., Wang, M.: Cryptography and relational database management systems. In: IDEAS 2001: Proceedings of the International Database Engineering & Applications Symposium, pp. 273–284. IEEE Computer Society, Washington (2001)

    Google Scholar 

  10. Mykletun, E., Tsudik, G.: Incorporating a secure coprocessor in the Database-as-a-Service model. In: IWIA 2005: Proceedings of the Innovative Architecture on Future Generation High-Performance Processors and Systems, pp. 38–44. IEEE Computer Society, Washington (2005)

    Google Scholar 

  11. Wong, W.K., Cheung, D.W., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. In: VLDB 2007: Proceedings of the 33rd international conference on Very large data bases, VLDB Endowment, pp. 111–122 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kadhem, H., Amagasa, T., Kitagawa, H. (2009). Encryption over Semi-trusted Database. In: Chen, L., Liu, C., Liu, Q., Deng, K. (eds) Database Systems for Advanced Applications. DASFAA 2009. Lecture Notes in Computer Science, vol 5667. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04205-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04205-8_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04204-1

  • Online ISBN: 978-3-642-04205-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics