Experiments With Queries Over Encrypted Data Using Secret Sharing

Richard Brinkman, B. Schoenmakers, J.M. Doumen, Willem Jonker

Research output: Book/ReportReportProfessional

2 Citations (Scopus)
45 Downloads (Pure)

Abstract

To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.
Original languageUndefined
Place of PublicationEnschede
PublisherDistributed and Embedded Security (DIES)
Number of pages14
Publication statusPublished - Aug 2005

Publication series

NameCTIT Technical Report Series
PublisherUniversity of Twente, Centre for Telematica and Information Technology (CTIT)
No.TR-CTIT-05-37
ISSN (Print)1381-3625

Keywords

  • SCS-Cybersecurity
  • METIS-248104
  • IR-57033
  • EWI-5732

Cite this

Brinkman, R., Schoenmakers, B., Doumen, J. M., & Jonker, W. (2005). Experiments With Queries Over Encrypted Data Using Secret Sharing. (CTIT Technical Report Series; No. TR-CTIT-05-37). Enschede: Distributed and Embedded Security (DIES).
Brinkman, Richard ; Schoenmakers, B. ; Doumen, J.M. ; Jonker, Willem. / Experiments With Queries Over Encrypted Data Using Secret Sharing. Enschede : Distributed and Embedded Security (DIES), 2005. 14 p. (CTIT Technical Report Series; TR-CTIT-05-37).
@book{4ef6f72cea104cfca8e321bd03fb8d4c,
title = "Experiments With Queries Over Encrypted Data Using Secret Sharing",
abstract = "To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.",
keywords = "SCS-Cybersecurity, METIS-248104, IR-57033, EWI-5732",
author = "Richard Brinkman and B. Schoenmakers and J.M. Doumen and Willem Jonker",
note = "Imported from CTIT",
year = "2005",
month = "8",
language = "Undefined",
series = "CTIT Technical Report Series",
publisher = "Distributed and Embedded Security (DIES)",
number = "TR-CTIT-05-37",

}

Brinkman, R, Schoenmakers, B, Doumen, JM & Jonker, W 2005, Experiments With Queries Over Encrypted Data Using Secret Sharing. CTIT Technical Report Series, no. TR-CTIT-05-37, Distributed and Embedded Security (DIES), Enschede.

Experiments With Queries Over Encrypted Data Using Secret Sharing. / Brinkman, Richard; Schoenmakers, B.; Doumen, J.M.; Jonker, Willem.

Enschede : Distributed and Embedded Security (DIES), 2005. 14 p. (CTIT Technical Report Series; No. TR-CTIT-05-37).

Research output: Book/ReportReportProfessional

TY - BOOK

T1 - Experiments With Queries Over Encrypted Data Using Secret Sharing

AU - Brinkman, Richard

AU - Schoenmakers, B.

AU - Doumen, J.M.

AU - Jonker, Willem

N1 - Imported from CTIT

PY - 2005/8

Y1 - 2005/8

N2 - To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.

AB - To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.

KW - SCS-Cybersecurity

KW - METIS-248104

KW - IR-57033

KW - EWI-5732

M3 - Report

T3 - CTIT Technical Report Series

BT - Experiments With Queries Over Encrypted Data Using Secret Sharing

PB - Distributed and Embedded Security (DIES)

CY - Enschede

ER -

Brinkman R, Schoenmakers B, Doumen JM, Jonker W. Experiments With Queries Over Encrypted Data Using Secret Sharing. Enschede: Distributed and Embedded Security (DIES), 2005. 14 p. (CTIT Technical Report Series; TR-CTIT-05-37).