Hacıgümüş et al., 2004 - Google Patents
Efficient execution of aggregation queries over encrypted relational databasesHacıgümüş et al., 2004
View PDF- Document ID
- 4852141746308195587
- Author
- Hacıgümüş H
- Iyer B
- Mehrotra S
- Publication year
- Publication venue
- International Conference on Database Systems for Advanced Applications
External Links
Snippet
Encryption is a common method to assure privacy of stored data. In many practical situations, decrypting data before applying logic compromises privacy. The challenge is to come up with logic transformation techniques and result-mapping methods so that the exact …
- 230000002776 aggregation 0 title abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hacıgümüş et al. | Efficient execution of aggregation queries over encrypted relational databases | |
Sun et al. | Practical backward-secure searchable encryption from symmetric puncturable encryption | |
US10089487B2 (en) | Masking query data access pattern in encrypted data | |
Li et al. | Adaptively secure conjunctive query processing over encrypted data for cloud computing | |
Popa et al. | CryptDB: A practical encrypted relational DBMS | |
US8607350B2 (en) | Sovereign information sharing service | |
US20150039885A1 (en) | Conjunctive search in encrypted data | |
Ibrahim et al. | Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data | |
Strizhov et al. | Multi-keyword similarity search over encrypted cloud data | |
Handa et al. | Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data | |
Kadhem et al. | MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values | |
Rizomiliotis et al. | ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes | |
Li et al. | Prism: Private verifiable set computation over multi-owner outsourced databases | |
Li et al. | Toward privacy-assured cloud data services with flexible search functionalities | |
Rauthan et al. | Vrs-db: Preserve confidentiality of users’ data using encryption approach | |
Hacıgümüş et al. | Query optimization in encrypted database systems | |
Moghadam et al. | Toward securing cloud-based data analytics: A discussion on current solutions and open issues | |
Hackenjos et al. | SAGMA: Secure aggregation grouped by multiple attributes | |
Zhang et al. | Efficient and provable security searchable asymmetric encryption in the cloud | |
Zhang et al. | Towards efficient and privacy-preserving interval skyline queries over time series data | |
Zhou et al. | EVSS: An efficient verifiable search scheme over encrypted cloud data | |
Tian et al. | Privacy preserving query processing on secret share based data storage | |
Zhang et al. | Divertible searchable symmetric encryption for secure cloud storage | |
Hore et al. | Managing and querying encrypted data | |
Aburawi | Cryptdb mechanism on graph databases |