EnclaveDB: A secure database using SGX

C Priebe, K Vaswani, M Costa - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

Pump up the volume: Practical database reconstruction from volume leakage on range queries

P Grubbs, MS Lacharité, B Minaud… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present attacks that use only the volume of responses to range queries to reconstruct
databases. Our focus is on practical attacks that work for large-scale databases with many …

Improved reconstruction attacks on encrypted data using range query leakage

MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing

S Patel, G Persiano, K Yeo, M Yung - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Volume leakage has recently been identified as a major threat to the security of
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …

Learning to reconstruct: Statistical learning theory and encrypted database attacks

P Grubbs, MS Lacharité, B Minaud… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
We show that the problem of reconstructing encrypted databases from access pattern
leakage is closely related to statistical learning theory. This new viewpoint enables us to …

Pancake: Frequency smoothing for encrypted data stores

P Grubbs, A Khandelwal, MS Lacharité… - 29th USENIX Security …, 2020 - usenix.org
We present PANCAKE, the first system to protect key-value stores from access pattern
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …

HEDA: multi-attribute unbounded aggregation over homomorphically encrypted database

X Ren, L Su, Z Gu, S Wang, F Li, Y **e, S Bian… - Proceedings of the …, 2022 - dl.acm.org
Recent years have witnessed the rapid development of the encrypted database, due to the
increasing number of data privacy breaches and the corresponding laws and regulations …