DocumentCode :
610414
Title :
Querying encrypted data
Author :
Arasu, A. ; Eguro, K. ; Kaushik, Rajashekara ; Ramamurthy, R.
fYear :
2013
fDate :
8-12 April 2013
Firstpage :
1262
Lastpage :
1263
Abstract :
Data security is a serious concern when we migrate data to a cloud DBMS. Database encryption, where sensitive columns are encrypted before they are stored in the cloud, has been proposed as a mechanism to address such data security concerns. The intuitive expectation is that an adversary cannot “learn” anything about the encrypted columns, since she does not have access to the encryption key. However, query processing becomes a challenge since it needs to “look inside” the data. This tutorial explores the space of designs studied in prior work on processing queries over encrypted data. We cover approaches based on both classic client-server and involving the use of a trusted hardware module where data can be securely decrypted. We discuss the privacy challenges that arise in both approaches and how they may be addressed. Briefly, supporting the full complexity of a modern DBMS including complex queries, transactions and stored procedures leads to significant challenges that we survey.
Keywords :
client-server systems; cloud computing; cryptography; database management systems; query processing; trusted computing; client-server; cloud DBMS; complex queries; data security; database encryption; encrypted data querying; encryption key; trusted hardware module; Encryption; Hardware; Query processing; Tutorials;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Data Engineering (ICDE), 2013 IEEE 29th International Conference on
Conference_Location :
Brisbane, QLD
ISSN :
1063-6382
Print_ISBN :
978-1-4673-4909-3
Electronic_ISBN :
1063-6382
Type :
conf
DOI :
10.1109/ICDE.2013.6544919
Filename :
6544919
Link To Document :
بازگشت