Experiments With Queries Over Encrypted Data Using Secret Sharing

Richard Brinkman, Berry Schoenmakers, Jeroen Doumen

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

48 Downloads (Pure)

Abstract

To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme like storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.
Original languageEnglish
Title of host publicationSecure Data Management
Subtitle of host publicationSecond VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings
EditorsWillem Jonker, Milan Petković
Place of PublicationBerlin, Heidelberg
PublisherSpringer
Pages33-46
Number of pages14
ISBN (Electronic)978-3-540-31974-0
ISBN (Print)978-3-540-28798-8
DOIs
Publication statusPublished - Sept 2005
Event2nd VLDB Workshop on Secure Data Management, SDM 2005 - Trondheim, Norway
Duration: 2 Sept 20053 Sept 2005
Conference number: 2

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume3674
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop2nd VLDB Workshop on Secure Data Management, SDM 2005
Abbreviated titleSDM
Country/TerritoryNorway
CityTrondheim
Period2/09/053/09/05

Keywords

  • DB-SDM: SECURE DATA MANAGEMENT
  • SCS-Cybersecurity
  • Equality test
  • Database scheme
  • Encrypt data
  • Pseudorandom generator
  • Advanced algorithm

Fingerprint

Dive into the research topics of 'Experiments With Queries Over Encrypted Data Using Secret Sharing'. Together they form a unique fingerprint.

Cite this