Security-preserving asymmetric protocol encapsulation
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
TRIMS, a privacy-aware trust and reputation model for identity management systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Encryption techniques for secure database outsourcing
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security and privacy risks. In this paper, we assess cryptographic solutions to the problem that some client party (Alex) wants to outsource database operations on sensitive data sets to a service provider (Eve) without having to trust her. Contracts are an option, but for various reasons their effectiveness is limited [2]. Alex would rather like to use privacy homomorphisms [6], i.e., encryption schemes that transform relational data sets and queries into ciphertext such that (i) the data is securely hidden from Eve; and (ii) Eve computes hidden results from hidden queries that Alex can efficiently decrypt. Unfortunately, all privacy homomorphisms we know of lack a rigorous security analysis. Before they can be used in practice, we need formal definitions that are both sound and practical to assess their effectiveness.