[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3460120.3484786acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

εpsolute: Efficiently Querying Databases While Providing Differential Privacy

Published: 13 November 2021 Publication History

Abstract

As organizations struggle with processing vast amounts of information, outsourcing sensitive data to third parties becomes a necessity. To protect the data, various cryptographic techniques are used in outsourced database systems to ensure data privacy, while allowing efficient querying. A rich collection of attacks on such systems has emerged. Even with strong cryptography, just communication volume or access pattern is enough for an adversary to succeed.
In this work we present a model for differentially private outsourced database system and a concrete construction, εpsolute, that provably conceals the aforementioned leakages, while remaining efficient and scalable. In our solution, differential privacy is preserved at the record level even against an untrusted server that controls data and queries. εpsolute combines Oblivious RAM and differentially private sanitizers to create a generic and efficient construction.
We go further and present a set of improvements to bring the solution to efficiency and practicality necessary for real-world adoption. We describe the way to parallelize the operations, minimize the amount of noise, and reduce the number of network requests, while preserving the privacy guarantees. We have run an extensive set of experiments, dozens of servers processing up to 10 million records, and compiled a detailed result analysis proving the efficiency and scalability of our solution. While providing strong security and privacy guarantees we are less than an order of magnitude slower than range query execution of a non-secure plain-text optimized RDBMS like MySQL and PostgreSQL.

Supplementary Material

MOV File (ccs2021-fp423-epsolute.mov)
A full presentation video going over the sections of the paper.

References

[1]
Arvind Arasu, Spyros Blanas, Ken Eguro, Manas Joglekar, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Prasang Upadhyaya, and Ramarathnam Venkatesan. 2013a. Secure Database-as-a-Service with Cipherbase. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data (SIGMOD '13). Association for Computing Machinery, 1033--1036. https://doi.org/10.1145/2463676.2467797
[2]
Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, and Ramarathnam Venkatesan. 2013b. Orthogonal Security With Cipherbase. In 6th Biennial Conference on Innovative Data Systems Research (CIDR'13).
[3]
Sumeet Bajaj and Radu Sion. 2013. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, Vol. 26, 3 (2013), 752--765. https://doi.org/10.1109/TKDE.2013.38
[4]
Johes Bater, Gregory Elliott, Craig Eggen, Satyender Goel, Abel Kho, and Jennie Rogers. 2017. SMCQL: Secure Querying for Federated Databases. Proc. VLDB Endow., Vol. 10, 6 (Feb. 2017), 673--684. https://doi.org/10.14778/3055330.3055334
[5]
Johes Bater, Xi He, William Ehrich, Ashwin Machanavajjhala, and Jennie Rogers. 2018. Shrinkwrap: efficient sql query processing in differentially private data federations. Proceedings of the VLDB Endowment, Vol. 12, 3 (2018), 307--320. https://doi.org/10.14778/3291264.3291274
[6]
Amos Beimel, Hai Brenner, Shiva Prasad Kasiviswanathan, and Kobbi Nissim. 2014. Bounds on the sample complexity for private learning and private data release. Machine learning, Vol. 94, 3 (2014), 401--437. https://doi.org/10.1007/s10994-013--5404--1
[7]
Amos Beimel, Kobbi Nissim, and Uri Stemmer. 2013. Private learning and sanitization: Pure vs. approximate differential privacy. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. Springer, 363--378. https://doi.org/10.1007/978--3--642--40328--6_26
[8]
Amos Beimel, Kobbi Nissim, and Mohammad Zaheri. 2019. Exploring Differential Obliviousness. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2019) (Leibniz International Proceedings in Informatics (LIPIcs), Vol. 145). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 65:1--65:20. https://doi.org/10.4230/LIPIcs.APPROX-RANDOM.2019.65
[9]
Vincent Bindschaedler, Paul Grubbs, David Cash, Thomas Ristenpart, and Vitaly Shmatikov. 2018. The Tao of Inference in Privacy-protected Databases. PVLDB, Vol. 11, 11 (2018), 1715--1728. https://doi.org/10.14778/3236187.3236217
[10]
Avrim Blum, Katrina Ligett, and Aaron Roth. 2013. A learning theory approach to non-interactive database privacy. Journal of the ACM (JACM), Vol. 60, 2 (2013), 1--25. https://doi.org/10.1145/1374376.1374464
[11]
Dmytro Bogatov. 2021 a. B+ tree (static). https://github.com/epsolute/b-plus-tree.
[12]
Dmytro Bogatov. 2021 b. epsolute. https://github.com/epsolute/epsolute.
[13]
Dmytro Bogatov. 2021 c. Original and procesed datasets used in this paper. http://csr.bu.edu/dp-oram/. Accessed: 2021-01--24.
[14]
Dmytro Bogatov. 2021 d. PathORAM. https://github.com/epsolute/path-oram.
[15]
Dmytro Bogatov, George Kollios, and Leonid Reyzin. 2019. A comparative evaluation of order-revealing encryption schemes and secure range-query protocols. Proceedings of the VLDB Endowment, Vol. 12, 8 (2019), 933--947. https://doi.org/10.14778/3324301.3324309
[16]
Mark Bun, Kobbi Nissim, Uri Stemmer, and Salil Vadhan. 2015. Differentially private release and learning of threshold functions. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science. IEEE, 634--649. https://doi.org/10.1109/FOCS.2015.45
[17]
David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakage-abuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 668--679. https://doi.org/10.1145/2810103.2813700
[18]
T-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, and Elaine Shi. 2019. Foundations of Differentially Oblivious Algorithms. In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms (San Diego, California) (SODA '19). Society for Industrial and Applied Mathematics, USA, 2448--2467.
[19]
Zhao Chang, Dong Xie, and Feifei Li. 2016. Oblivious RAM: A dissection and experimental evaluation. Proceedings of the VLDB Endowment, Vol. 9, 12, 1113--1124. https://doi.org/10.14778/2994509.2994528
[20]
Binyi Chen, Huijia Lin, and Stefano Tessaro. 2016. Oblivious Parallel RAM: Improved Efficiency and Generic Constructions. In Theory of Cryptography, Eyal Kushilevitz and Tal Malkin (Eds.). Springer Berlin Heidelberg, 205--234. https://doi.org/10.1007/978--3--662--49099-0_8
[21]
Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020. SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2433--2450. https://www.usenix.org/conference/usenixsecurity20/presentation/demertzis
[22]
Ioannis Demertzis, Stavros Papadopoulos, Odysseas Papapetrou, Antonios Deligiannakis, and Minos Garofalakis. 2016. Practical private range search revisited. In Proceedings of the 2016 International Conference on Management of Data. 185--198. https://doi.org/10.1145/2882903.2882911
[23]
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006 a. Our data, ourselves: Privacy via distributed noise generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 486--503. https://doi.org/10.1007/11761679_29
[24]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006 b. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284. https://doi.org/10.1007/11681878_14
[25]
Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. 2010. Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. 715--724. https://doi.org/10.1145/1806689.1806787
[26]
Morris Dworkin. 2001. Recommendation for Block Cipher Modes of Operation: Methods and Techniques. https://doi.org/10.6028/NIST.SP.800--38A
[27]
Morris Dworkin, Elaine Barker, James Nechvatal, James Foti, Lawrence Bassham, E. Roback, and James Dray. 2001. Advanced Encryption Standard (AES). https://doi.org/10.6028/NIST.FIPS.197
[28]
Saba Eskandarian and Matei Zaharia. 2019. ObliDB: Oblivious query processing for secure databases. PVLDB, Vol. 13, 2 (2019), 169--183. https://doi.org/10.14778/3364324.3364331
[29]
Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, and Ahmad-Reza Sadeghi. 2017. HardIDX: Practical and secure index with SGX. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 386--408. https://doi.org/10.1007/978--3--319--61176--1_22
[30]
Craig Gentry. 2010. Computing arbitrary functions of encrypted data. Commun. ACM, Vol. 53, 3 (2010), 97--105. https://doi.org/10.1145/1666420.1666444
[31]
Oded Goldreich. 1987. Towards a theory of software protection and simulation by oblivious RAMs. In Proceedings of the nineteenth annual ACM symposium on Theory of computing. 182--194. https://doi.org/10.1145/28395.28416
[32]
Oded Goldreich and Rafail Ostrovsky. 1996. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM), Vol. 43, 3 (1996), 431--473. https://doi.org/10.1145/233551.233553
[33]
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, and Kenneth G Paterson. 2018. Pump up the volume: Practical database reconstruction from volume leakage on range queries. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 315--331. https://doi.org/10.1145/3243734.3243864
[34]
Paul Grubbs, Thomas Ristenpart, and Vitaly Shmatikov. 2017. Why Your Encrypted Database Is Not Secure. In Proceedings of the 16th Workshop on Hot Topics in Operating Systems. ACM, 162--168. https://doi.org/10.1145/3102980.3103007
[35]
Zichen Gui, Oliver Johnson, and Bogdan Warinschi. 2019. Encrypted databases: New volume attacks against range queries. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 361--378. https://doi.org/10.1145/3319535.3363210
[36]
Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2010. Boosting the Accuracy of Differentially Private Histograms through Consistency. Proc. VLDB Endow., Vol. 3, 1--2 (Sept. 2010), 1021--1032. https://doi.org/10.14778/1920841.1920970
[37]
Bijit Hore, Sharad Mehrotra, Mustafa Canim, and Murat Kantarcioglu. 2012. Secure multidimensional range queries over outsourced data. VLDBJ, Vol. 21, 3 (2012), 333--358. https://doi.org/10.1007/s00778-011-0245--7
[38]
Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C Pierce, and Aaron Roth. 2014. Differential privacy: An economic method for choosing epsilon. In 2014 IEEE 27th Computer Security Foundations Symposium. IEEE, 398--410. https://doi.org/10.1109/CSF.2014.35
[39]
Yuval Ishai, Eyal Kushilevitz, Steve Lu, and Rafail Ostrovsky. 2016. Private large-scale databases with distributed searchable symmetric encryption. In Cryptographers' Track at the RSA Conference. Springer, 90--107. https://doi.org/10.1007/978--3--319--29485--8_6
[40]
Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5--8, 2012. The Internet Society.
[41]
Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2014. Inference attack against encrypted range queries on outsourced databases. In Proceedings of the 4th ACM conference on Data and application security and privacy. 235--246. https://doi.org/10.1145/2557547.2557561
[42]
Haim Kaplan, Katrina Ligett, Yishay Mansour, Moni Naor, and Uri Stemmer. 2020. Privately Learning Thresholds: Closing the Exponential Gap. In Proceedings of Thirty Third Conference on Learning Theory (Proceedings of Machine Learning Research, Vol. 125). PMLR, 2263--2285.
[43]
Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O'neill. 2016. Generic attacks on secure outsourced databases. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1329--1340. https://doi.org/10.1145/2976749.2978386
[44]
Evgenios M Kornaropoulos, Charalampos Papamanthou, and Roberto Tamassia. 2020. The state of the uniform: attacks on encrypted databases beyond the uniform query distribution. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1223--1240. https://doi.org/10.1109/SP40000.2020.00029
[45]
Marie-Sarah Lacharité, Brice Minaud, and Kenneth G Paterson. 2018. Improved reconstruction attacks on encrypted data using range query leakage. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 297--314. https://doi.org/10.1109/SP.2018.00002
[46]
Kasper Green Larsen, Mark Simkin, and Kevin Yeo. 2020. Lower Bounds for Multi-server Oblivious RAMs. In Theory of Cryptography. Springer International Publishing, 486--503. https://doi.org/10.1007/978--3-030--64375--1_17
[47]
Frank D McSherry. 2009. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. 19--30. https://doi.org/10.1145/1559845.1559850
[48]
Microsoft. 2021. MS-SQL Always Encrypted. https://docs.microsoft.com/sql/relational-databases/security/encryption/always-encrypted-database-engine.
[49]
Ilya Mironov, Omkant Pandey, Omer Reingold, and Salil Vadhan. 2009. Computational differential privacy. In Annual International Cryptology Conference. Springer, 126--142. https://doi.org/10.1007/978--3--642-03356--8_8
[50]
Pratyush Mishra, Rishabh Poddar, Jerry Chen, Alessandro Chiesa, and Raluca Ada Popa. 2018. Oblix: An efficient oblivious search index. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 279--296. https://doi.org/10.1109/SP.2018.00045
[51]
Muhammad Naveed, Seny Kamara, and Charles V Wright. 2015. Inference attacks on property-preserving encrypted databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 644--655. https://doi.org/10.1145/2810103.2813651
[52]
National Institute of Standards and Technology. 2015. Secure Hash Standard (SHS). https://doi.org/10.6028/NIST.FIPS.180--4
[53]
Oracle. 2021. Introduction to Transparent Data Encryption. https://docs.oracle.com/database/121/ASOAG/introduction-to-transparent-data-encryption.htm.
[54]
Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan. 2016. Big Data Analytics over Encrypted Datasets with Seabed. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, 587--602.
[55]
Rishabh Poddar, Tobias Boelter, and Raluca Ada Popa. 2019. Arx: an encrypted database using semantically secure encryption. Proceedings of the VLDB Endowment, Vol. 12, 11 (2019), 1664--1678. https://doi.org/10.14778/3342263.3342641
[56]
Raluca Ada Popa, Catherine MS Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. 85--100.
[57]
Christian Priebe, Kapil Vaswani, and Manuel Costa. 2018. EnclaveDB: A secure database using SGX. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 264--278. https://doi.org/10.1109/SP.2018.00025
[58]
Wahbeh Qardaji, Weining Yang, and Ninghui Li. 2013. Understanding hierarchical methods for differentially private histograms. Proceedings of the VLDB Endowment, Vol. 6, 14 (2013), 1954--1965. https://doi.org/10.14778/2556549.2556576
[59]
Amrita Roy Chowdhury, Chenghong Wang, Xi He, Ashwin Machanavajjhala, and Somesh Jha. 2020. Crypt?: Crypto-assisted differential privacy on untrusted servers. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 603--619. https://doi.org/10.1145/3318464.3380596
[60]
Cetin Sahin, Tristan Allard, Reza Akbarinia, Amr El Abbadi, and Esther Pacitti. 2018. A Differentially Private Index for Range Query Processing in Clouds. In 2018 IEEE 34th International Conference on Data Engineering (ICDE). 857--868. https://doi.org/10.1109/ICDE.2018.00082
[61]
Cetin Sahin, Victor Zakhary, Amr El Abbadi, Huijia Lin, and Stefano Tessaro. 2016. Taostore: Overcoming asynchronicity in oblivious data storage. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 198--217. https://doi.org/10.1109/SP.2016.20
[62]
Bharath Kumar Samanthula, Wei Jiang, and Elisa Bertino. 2014. Privacy-preserving complex query evaluation over semantically secure encrypted data. In European Symposium on Research in Computer Security. Springer, 400--418. https://doi.org/10.1007/978--3--319--11203--9_23
[63]
Elaine Shi, T-H Hubert Chan, Emil Stefanov, and Mingfei Li. 2011. Oblivious RAM with worst-case cost. In International Conference on The Theory and Application of Cryptology and Information Security. Springer, 197--214. https://doi.org/10.1007/978--3--642--25385-0_11
[64]
Emil Stefanov, Elaine Shi, and Dawn Xiaodong Song. 2012. Towards Practical Oblivious RAM. In Network and Distributed System Security Symposium (NDSS).
[65]
Emil Stefanov, Marten Van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. 2013. Path ORAM: an extremely simple oblivious RAM protocol. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 299--310. https://doi.org/10.1145/3177872
[66]
Siddharth Suri and Sergei Vassilvitskii. 2011. Counting triangles and the curse of the last reducer. In Proceedings of the 20th international conference on World wide web. 607--614. https://doi.org/10.1145/1963405.1963491
[67]
Transparent California. 2019. California public pay and pension 2019 dataset. https://transparentcalifornia.com.
[68]
U.S. Census Bureau. 2018. American Community Survey Public Use Microdata Sample. https://www.census.gov/programs-surveys/acs/microdata.html.
[69]
Vinod Vaikuntanathan. 2011. Computing blindfolded: New developments in fully homomorphic encryption. In 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. IEEE, 5--16. https://doi.org/10.1109/FOCS.2011.98
[70]
Dhinakaran Vinayagamurthy, Alexey Gribov, and Sergey Gorbunov. 2019. StealthDB: a scalable encrypted database with full SQL query support. Proceedings on Privacy Enhancing Technologies, Vol. 2019, 3 (2019), 370--388. https://doi.org/10.2478/popets-2019-0052
[71]
Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.
[72]
Xiaokui Xiao, Guozhang Wang, and Johannes Gehrke. 2010. Differential privacy via wavelet transforms. IEEE Transactions on knowledge and data engineering, Vol. 23, 8 (2010), 1200--1214. https://doi.org/10.1109/TKDE.2010.247
[73]
Dong Xie, Guanru Li, Bin Yao, Xuan Wei, Xiaokui Xiao, Yunjun Gao, and Minyi Guo. 2016. Practical private shortest path computation based on oblivious storage. In 2016 IEEE 32nd International Conference on Data Engineering (ICDE). IEEE, 361--372. https://doi.org/10.1109/ICDE.2016.7498254
[74]
Min Xu, Antonis Papadimitriou, Andreas Haeberlen, and Ariel Feldman. 2019. Hermetic: Privacy-preserving distributed analytics without (most) side channels. (2019).
[75]
Wenting Zheng, Ankur Dave, Jethro G Beekman, Raluca Ada Popa, Joseph E Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17). 283--298.

Cited By

View all
  • (2024)The Price of Privacy: A Performance Study of Confidential Virtual Machines for Database SystemsProceedings of the 20th International Workshop on Data Management on New Hardware10.1145/3662010.3663440(1-8)Online publication date: 10-Jun-2024
  • (2024)FedKNN: Secure Federated k-Nearest Neighbor SearchProceedings of the ACM on Management of Data10.1145/36392662:1(1-26)Online publication date: 26-Mar-2024
  • (2024)Secure and Practical Functional Dependency Discovery in Outsourced Databases2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00134(1645-1658)Online publication date: 13-May-2024
  • Show More Cited By

Index Terms

  1. εpsolute: Efficiently Querying Databases While Providing Differential Privacy

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 2021
    3558 pages
    ISBN:9781450384544
    DOI:10.1145/3460120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. differential obliviousness
    2. differential privacy
    3. oram
    4. sanitizers

    Qualifiers

    • Research-article

    Funding Sources

    • NSF

    Conference

    CCS '21
    Sponsor:
    CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
    November 15 - 19, 2021
    Virtual Event, Republic of Korea

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)117
    • Downloads (Last 6 weeks)20
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Price of Privacy: A Performance Study of Confidential Virtual Machines for Database SystemsProceedings of the 20th International Workshop on Data Management on New Hardware10.1145/3662010.3663440(1-8)Online publication date: 10-Jun-2024
    • (2024)FedKNN: Secure Federated k-Nearest Neighbor SearchProceedings of the ACM on Management of Data10.1145/36392662:1(1-26)Online publication date: 26-Mar-2024
    • (2024)Secure and Practical Functional Dependency Discovery in Outsourced Databases2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00134(1645-1658)Online publication date: 13-May-2024
    • (2023)Doquet: Differentially Oblivious Range and Join Queries with Private Data StructuresProceedings of the VLDB Endowment10.14778/3625054.362505516:13(4160-4173)Online publication date: 1-Sep-2023
    • (2023)HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic EncryptionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616608(2930-2944)Online publication date: 15-Nov-2023
    • (2023)A Theory of Composition for Differential ObliviousnessAdvances in Cryptology – EUROCRYPT 202310.1007/978-3-031-30620-4_1(3-34)Online publication date: 23-Apr-2023
    • (2022)Range Search over Encrypted Multi-Attribute DataProceedings of the VLDB Endowment10.14778/3574245.357424716:4(587-600)Online publication date: 1-Dec-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media