Handbook of Applied Cryptography
Handbook of Applied Cryptography
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Executing SQL queries over encrypted character strings in the Database-As-Service model
Knowledge-Based Systems
Processing analytical queries over encrypted data
Proceedings of the VLDB Endowment
Hi-index | 0.00 |
To ensure the privacy of data in the relational databases, prior work has given techniques to support data encryption and execute SQL queries over the encrypted data. However, the problem of how to put these techniques together in an optimum manner was not addressed, which is equivalent to having an RDBMS without a query optimizer. This paper models and solves that optimization problem.