Guidelines for Using the CryptDB System Securely
نویسندگان
چکیده
This report has two goals. First, we review guidelines for using the CryptDB system [PRZB11, Pop14] securely by the administrators of database applications. These guidelines were already described in [PRZB11] and elaborated on in [Pop14], but in light of some recent work [NKW15] that applied these guidelines incorrectly, a short document devoted to summarizing these guidelines may be useful. Second, we explain that the study of Naveed, Kamara, and Wright [NKW15] represents an unsafe usage of CryptDB, violating CryptDB’s security guidelines. Hence, the conclusions drawn in that paper regarding CryptDB’s guarantees for medical applications are incorrect: had the guidelines been followed, none of the claimed attacks would have been possible.
منابع مشابه
CryptDB: A Practical Encrypted Relational DBMS
CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable query-based encryption which allows CryptDB to adjust the encrypti...
متن کاملDimensions and Constituents of a Desired Model for Setting Guidelines within the Iranian System of Education
The educational system of any country plays a significant role in its sustainable development and progress. However, to fulfill this function there must exist a set of guidelines and policies aimed at such development. The process of setting such a set of guidelines requires a homegrown model for development of the guidelines, and their implementation and supervision. To this end, 14 interviews...
متن کاملNurses’ knowledge of evidence- based guidelines for preventing ventilator-associated pneumonia in intensive care units
Background and Purpose: Implementing the guidelines to prevent VAP has been shown to have a significant effect on reducing the incidence of VAP. Studies indicate that ICU staff have poor knowledge and low implementation rate of the standard preventive measures related to VAP. The present study aims to evaluate the knowledge of nurses in the intensive care unit in University hospitals of Sari. ...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015