EnclaveDB: A secure database using SGX
We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and
freshness for data and queries. EnclaveDB guarantees these properties even when the …
freshness for data and queries. EnclaveDB guarantees these properties even when the …
Enabling efficient and geometric range query with access control over encrypted spatial data
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
Pump up the volume: Practical database reconstruction from volume leakage on range queries
We present attacks that use only the volume of responses to range queries to reconstruct
databases. Our focus is on practical attacks that work for large-scale databases with many …
databases. Our focus is on practical attacks that work for large-scale databases with many …
Improved reconstruction attacks on encrypted data using range query leakage
MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …
persistent adversaries. The bulk of our work applies to a generic setting, where the …
Revisiting leakage abuse attacks
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …
encrypted data. ESAs can be designed with various primitives including …
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
Volume leakage has recently been identified as a major threat to the security of
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …
cryptographic cloud-based data structures by Kellaris\em et al. CCS'16 (see also the attacks …
Sok: Cryptographically protected database search
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …
writing to, and administering the database. This separation limits unnecessary administrator …
Learning to reconstruct: Statistical learning theory and encrypted database attacks
We show that the problem of reconstructing encrypted databases from access pattern
leakage is closely related to statistical learning theory. This new viewpoint enables us to …
leakage is closely related to statistical learning theory. This new viewpoint enables us to …
Pancake: Frequency smoothing for encrypted data stores
We present PANCAKE, the first system to protect key-value stores from access pattern
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …
leakage attacks with small constant factor bandwidth overhead. PANCAKE uses a new …
HEDA: multi-attribute unbounded aggregation over homomorphically encrypted database
Recent years have witnessed the rapid development of the encrypted database, due to the
increasing number of data privacy breaches and the corresponding laws and regulations …
increasing number of data privacy breaches and the corresponding laws and regulations …