Multi-application smart cards and encrypted data processing
Future Generation Computer Systems - Special issue on smart cards
Building a high-performance, programmable secure coprocessor
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Rethinking Database System Architecture: Towards a Self-Tuning RISC-Style Database System
VLDB '00 Proceedings of the 26th International Conference on Very Large Data Bases
The Vault, an Architecture for Smartcards to Gain Infinite Memory
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
PicoDBMS: Validation and Experience
Proceedings of the 27th International Conference on Very Large Data Bases
PicoDBMS: Scaling down database techniques for the smartcard
The VLDB Journal — The International Journal on Very Large Data Bases
Cryptography and Relational Database Management Systems
IDEAS '01 Proceedings of the 2001 International Symposium on Database Engineering & Applications
Breaking up is hard to do: modeling security threats for smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
Implementation of a Storage Mechanism for Untrusted DBMSs
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Mobile databases: a selection of open issues and research directions
ACM SIGMOD Record
Modeling and assessing inference exposure in encrypted databases
ACM Transactions on Information and System Security (TISSEC)
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Fortifying password authentication in integrated healthcare delivery systems
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
Chip-secured data access: reconciling access rights with data encryption
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Over-encryption: management of access control evolution on outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On indexing and information disclosure measure for efficient cryptograph query
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
A secure multi-dimensional partition based index in DAS
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
TrustedDB: a trusted hardware based database with privacy and data confidentiality
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Designing secure indexes for encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving search and updates for outsourced tree-structured data on untrusted servers
iTrust'05 Proceedings of the Third international conference on Trust Management
Privacy-preserving queries on encrypted data
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
EISA – an enterprise application security solution for databases
ICISS'05 Proceedings of the First international conference on Information Systems Security
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
Identity-based data storage in cloud computing
Future Generation Computer Systems
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
Information Resources Management Journal
Hi-index | 0.00 |
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural resort to Web-hosting companies strongly emphasize the need for data confidentiality. Database servers arouse user's suspicion because no one can fully trust traditional security mechanisms against more and more frequent and malicious attacks and no one can be fully confident on an invisible DBA administering confidential data. This paper gives an in-depth analysis of existing security solutions and concludes on the intrinsic weakness of the traditional server-based approach to preserve data confidentiality. With this statement in mind, we propose a solution called C-SDA (Chip-Secured Data Access), which enforces data confidentiality and controls personal privileges thanks to a client-based security component acting as a mediator between a client and an encrypted database. This component is embedded in a smartcard to prevent any tampering to occur. This cooperation of hardware and software security components constitutes a strong guarantee against attacks threatening personal as well as business data.