The Community for Technology Leaders
2013 IEEE 29th International Conference on Data Engineering (ICDE) (2006)
Atlanta, Georgia
Apr. 3, 2006 to Apr. 7, 2006
ISBN: 0-7695-2570-9
pp: 117
Oliver Gunther , Humboldt-Universitat zu Berlin
Matthias Fischmann , Humboldt-Universitat zu Berlin
Sergei Evdokimov , Humboldt-Universitat zu Berlin
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security and privacy risks. In this paper, we assess cryptographic solutions to the problem that some client party (Alex) wants to outsource database operations on sensitive data sets to a service provider (Eve) without having to trust her. Contracts are an option, but for various reasons their effectiveness is limited [2]. Alex would rather like to use privacy homomorphisms [6], i.e., encryption schemes that transform relational data sets and queries into ciphertext such that (i) the data is securely hidden from Eve; and (ii) Eve computes hidden results from hidden queries that Alex can efficiently decrypt. Unfortunately, all privacy homomorphisms we know of lack a rigorous security analysis. Before they can be used in practice, we need formal definitions that are both sound and practical to assess their effectiveness.
Oliver Gunther, Matthias Fischmann, Sergei Evdokimov, "Provable Security for Outsourcing Database Operations", 2013 IEEE 29th International Conference on Data Engineering (ICDE), vol. 00, no. , pp. 117, 2006, doi:10.1109/ICDE.2006.121
185 ms
(Ver 3.3 (11022016))