An ideal-security protocol for order-preserving encoding
Order-preserving encryption-an encryption scheme where the sort order of ciphertexts
matches the sort order of the corresponding plaintexts-allows databases and other …
matches the sort order of the corresponding plaintexts-allows databases and other …
TrustedDB: a trusted hardware based database with privacy and data confidentiality
S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …
with privacy and under regulatory compliance constraints without having to trust the service …
Why your encrypted database is not secure
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …
management systems (DBMS's), use abstract threat models that capture neither realistic …
[PDF][PDF] Database security and encryption: A survey study
Security in today's world is one of the important challenges that people are facing all over
the world in every aspect of their lives. Similarly security in electronic world has a great …
the world in every aspect of their lives. Similarly security in electronic world has a great …
Database encryption system, method, and program
K Mori, S Obana, J Furukawa, I Teranishi… - US Patent …, 2014 - Google Patents
A user apparatus connected to database apparatus via network comprises: unit that
manages key information in order to encrypt and decrypt; storage unit that stores security …
manages key information in order to encrypt and decrypt; storage unit that stores security …
CryptDB: A practical encrypted relational DBMS
CryptDB is a DBMS that provides provable and practical privacy in the face of a
compromised database server or curious database administrators. CryptDB works by …
compromised database server or curious database administrators. CryptDB works by …
Security analysis for order preserving encryption schemes
L **ao, IL Yen - 2012 46th annual conference on information …, 2012 - ieeexplore.ieee.org
The development of third-party hosting, IT out-sourcing, service clouds, etc. raises important
security concerns. It is safer to encrypt critical data that is hosted by a third party. However, a …
security concerns. It is safer to encrypt critical data that is hosted by a third party. However, a …
An estimation model for test execution effort
Testing is an important activity to ensure software quality. Big organizations can have
several development teams with their products being tested by overloaded test teams. In …
several development teams with their products being tested by overloaded test teams. In …
Chaotic order preserving encryption for efficient and secure queries on databases
S Lee, TJ Park, D Lee, T Nam, S Kim - IEICE transactions on …, 2009 - search.ieice.org
The need for data encryption that protects sensitive data in a database has increased
rapidly. However, encrypted data can no longer be efficiently queried because nearly all of …
rapidly. However, encrypted data can no longer be efficiently queried because nearly all of …
A comprehensive framework for secure query processing on relational data in the cloud
Data security in the cloud is a big concern that blocks the widespread use of the cloud for
relational data management. First, to ensure data security, data confidentiality needs to be …
relational data management. First, to ensure data security, data confidentiality needs to be …