Abstract
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme like storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.
Original language | English |
---|---|
Title of host publication | Secure Data Management |
Subtitle of host publication | Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings |
Editors | Willem Jonker, Milan Petković |
Place of Publication | Berlin, Heidelberg |
Publisher | Springer |
Pages | 33-46 |
Number of pages | 14 |
ISBN (Electronic) | 978-3-540-31974-0 |
ISBN (Print) | 978-3-540-28798-8 |
DOIs | |
Publication status | Published - Sep 2005 |
Event | 2nd VLDB Workshop on Secure Data Management, SDM 2005 - Trondheim, Norway Duration: 2 Sep 2005 → 3 Sep 2005 Conference number: 2 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 3674 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Workshop
Workshop | 2nd VLDB Workshop on Secure Data Management, SDM 2005 |
---|---|
Abbreviated title | SDM |
Country | Norway |
City | Trondheim |
Period | 2/09/05 → 3/09/05 |
Keywords
- DB-SDM: SECURE DATA MANAGEMENT
- SCS-Cybersecurity
- Equality test
- Database scheme
- Encrypt data
- Pseudorandom generator
- Advanced algorithm