[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hacıgümüş et al., 2004 - Google Patents

Efficient execution of aggregation queries over encrypted relational databases

Hacıgümüş et al., 2004

View PDF
Document ID
4852141746308195587
Author
Hacıgümüş H
Iyer B
Mehrotra S
Publication year
Publication venue
International Conference on Database Systems for Advanced Applications

External Links

Snippet

Encryption is a common method to assure privacy of stored data. In many practical situations, decrypting data before applying logic compromises privacy. The challenge is to come up with logic transformation techniques and result-mapping methods so that the exact …
Continue reading at www.comp.nus.edu.sg (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Hacıgümüş et al. Efficient execution of aggregation queries over encrypted relational databases
Sun et al. Practical backward-secure searchable encryption from symmetric puncturable encryption
US10089487B2 (en) Masking query data access pattern in encrypted data
Li et al. Adaptively secure conjunctive query processing over encrypted data for cloud computing
Popa et al. CryptDB: A practical encrypted relational DBMS
US8607350B2 (en) Sovereign information sharing service
US20150039885A1 (en) Conjunctive search in encrypted data
Ibrahim et al. Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
Strizhov et al. Multi-keyword similarity search over encrypted cloud data
Handa et al. Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data
Kadhem et al. MV-OPES: Multivalued-order preserving encryption scheme: A novel scheme for encrypting integer value to many different values
Rizomiliotis et al. ORAM based forward privacy preserving dynamic searchable symmetric encryption schemes
Li et al. Prism: Private verifiable set computation over multi-owner outsourced databases
Li et al. Toward privacy-assured cloud data services with flexible search functionalities
Rauthan et al. Vrs-db: Preserve confidentiality of users’ data using encryption approach
Hacıgümüş et al. Query optimization in encrypted database systems
Moghadam et al. Toward securing cloud-based data analytics: A discussion on current solutions and open issues
Hackenjos et al. SAGMA: Secure aggregation grouped by multiple attributes
Zhang et al. Efficient and provable security searchable asymmetric encryption in the cloud
Zhang et al. Towards efficient and privacy-preserving interval skyline queries over time series data
Zhou et al. EVSS: An efficient verifiable search scheme over encrypted cloud data
Tian et al. Privacy preserving query processing on secret share based data storage
Zhang et al. Divertible searchable symmetric encryption for secure cloud storage
Hore et al. Managing and querying encrypted data
Aburawi Cryptdb mechanism on graph databases