Experiments With Queries Over Encrypted Data Using Secret Sharing

Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker

Research output: Book/ReportReportProfessional

2 Citations (Scopus)
88 Downloads (Pure)

Abstract

To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.
Original languageEnglish
Place of PublicationEnschede
PublisherCentre for Telematics and Information Technology (CTIT)
Number of pages14
Publication statusPublished - Aug 2005

Publication series

NameCTIT Technical Report Series
PublisherUniversity of Twente, Centre for Telematica and Information Technology (CTIT)
No.TR-CTIT-05-37
ISSN (Print)1381-3625

Keywords

  • SCS-Cybersecurity

Fingerprint

Dive into the research topics of 'Experiments With Queries Over Encrypted Data Using Secret Sharing'. Together they form a unique fingerprint.
  • Experiments With Queries Over Encrypted Data Using Secret Sharing

    Brinkman, R., Schoenmakers, B. & Doumen, J., Sept 2005, Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings. Jonker, W. & Petković, M. (eds.). Berlin, Heidelberg: Springer, p. 33-46 14 p. (Lecture Notes in Computer Science; vol. 3674).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    48 Downloads (Pure)

Cite this