Experiments with Queries over Encrypted Data Using Secret Sharing
نویسندگان
چکیده
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an encrypted database system that allows remote querying over the encrypted data. Experiments with the system show the practical impact of our encoding scheme on storage space and CPU time. Two algorithms, each with two different matching rules, are compared to each other.
منابع مشابه
Separating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملSecret Image Sharing Using Pseudo-Random Sequence
We propose a new concept which is derived from the cryptography, the substitution of bits in the image and the visual cryptography method. Given some secret data and a set of cover images, in the proposed scheme the secret data is encrypted by the administrator, after that we select the random bit planes of the cover images using the pseudo-random sequence and modify the cover image based on th...
متن کاملSecure Audio Reverberation over Cloud
Most individuals, governments and companies who outsource audio content to Cloud Data Centers (CDCs) for storage also make use of their high-end computing services. However, security and privacy issues related to CDCs make it difficult for data to be processed without compromising security. In this work, we propose a secure method for artificially adding reverberation effects to an audio secret...
متن کاملMultiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks
Although current online social networks (OSNs) schemes propose to encrypt data before sharing, the enforcement of access policies over encrypted data has become a challenging task, and the OSNs currently do not provide any mechanism to allow users to update access policies. In this paper, we propose a ciphertext sharing scheme in cloudbased OSNs, which allows the users to outsource encrypted da...
متن کاملEvaluating Predicates over Encrypted Data
Predicate encryption is a new encryption paradigm where the secret key owner can perform fine-grained access control over the encrypted data. In particular, the secret key owner can generate a capability corresponding to a query predicate (e.g., whether an encrypted email contains the keyword MEDICAL), and the capability allows one to evaluate the outcome of this predicate on the encrypted data...
متن کامل