An ideal-security protocol for order-preserving encoding

RA Popa, FH Li, N Zeldovich - 2013 IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Order-preserving encryption-an encryption scheme where the sort order of ciphertexts
matches the sort order of the corresponding plaintexts-allows databases and other …

TrustedDB: a trusted hardware based database with privacy and data confidentiality

S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …

Why your encrypted database is not secure

P Grubbs, T Ristenpart, V Shmatikov - … of the 16th workshop on hot …, 2017 - dl.acm.org
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …

[PDF][PDF] Database security and encryption: A survey study

I Basharat, F Azam, AW Muzaffar - International Journal of Computer …, 2012 - Citeseer
Security in today's world is one of the important challenges that people are facing all over
the world in every aspect of their lives. Similarly security in electronic world has a great …

Database encryption system, method, and program

K Mori, S Obana, J Furukawa, I Teranishi… - US Patent …, 2014 - Google Patents
A user apparatus connected to database apparatus via network comprises: unit that
manages key information in order to encrypt and decrypt; storage unit that stores security …

CryptDB: A practical encrypted relational DBMS

RA Popa, N Zeldovich, H Balakrishnan - 2011 - dspace.mit.edu
CryptDB is a DBMS that provides provable and practical privacy in the face of a
compromised database server or curious database administrators. CryptDB works by …

Security analysis for order preserving encryption schemes

L **ao, IL Yen - 2012 46th annual conference on information …, 2012 - ieeexplore.ieee.org
The development of third-party hosting, IT out-sourcing, service clouds, etc. raises important
security concerns. It is safer to encrypt critical data that is hosted by a third party. However, a …

An estimation model for test execution effort

E Aranha, P Borba - First International Symposium on Empirical …, 2007 - ieeexplore.ieee.org
Testing is an important activity to ensure software quality. Big organizations can have
several development teams with their products being tested by overloaded test teams. In …

Chaotic order preserving encryption for efficient and secure queries on databases

S Lee, TJ Park, D Lee, T Nam, S Kim - IEICE transactions on …, 2009 - search.ieice.org
The need for data encryption that protects sensitive data in a database has increased
rapidly. However, encrypted data can no longer be efficiently queried because nearly all of …

A comprehensive framework for secure query processing on relational data in the cloud

S Wang, D Agrawal, A El Abbadi - … 8th VLDB Workshop, SDM 2011, Seattle …, 2011 - Springer
Data security in the cloud is a big concern that blocks the widespread use of the cloud for
relational data management. First, to ensure data security, data confidentiality needs to be …