A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Cryptography and Relational Database Management Systems
IDEAS '01 Proceedings of the 2001 International Symposium on Database Engineering & Applications
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
An Integrated Approach for Database Security and Fault Tolerance
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Implementation of a Storage Mechanism for Untrusted DBMSs
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Chip-secured data access: confidential data on untrusted servers
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A data masking technique for data warehouses
Proceedings of the 15th Symposium on International Database Engineering & Applications
DaWaK'12 Proceedings of the 14th international conference on Data Warehousing and Knowledge Discovery
Hi-index | 0.00 |
Recent paradigms like “database as a service” require an additional infrastructure to guarantee data security. Data protection laws such as HIPAA (Health Insurance Portability and Accountability Act), Gramm-Leach-Bliley Act of 1999, Data protection Act, Sarbanes Oxleys Act are demanding for the data security to an extent that the critical information should be seen only by the authorized users which means the integrity and confidentiality of the database must be properly accommodated. Hence we aim at building up a wrapper/interface in between encrypted database server and applications that ensures the data privacy and integrity. Specifically, we worked on querying over encrypted databases and our approach produces query results on encrypted data with no false hits and hence reduces the network consumption between applications and encrypted server.