Guidelines for Using the CryptDB System Securely

نویسندگان

  • Raluca A. Popa
  • Nickolai Zeldovich
  • Hari Balakrishnan
چکیده

This report has two goals. First, we review guidelines for using the CryptDB system [PRZB11, Pop14] securely by the administrators of database applications. These guidelines were already described in [PRZB11] and elaborated on in [Pop14], but in light of some recent work [NKW15] that applied these guidelines incorrectly, a short document devoted to summarizing these guidelines may be useful. Second, we explain that the study of Naveed, Kamara, and Wright [NKW15] represents an unsafe usage of CryptDB, violating CryptDB’s security guidelines. Hence, the conclusions drawn in that paper regarding CryptDB’s guarantees for medical applications are incorrect: had the guidelines been followed, none of the claimed attacks would have been possible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CryptDB: A Practical Encrypted Relational DBMS

CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable query-based encryption which allows CryptDB to adjust the encrypti...

متن کامل

Dimensions and Constituents of a Desired Model for Setting Guidelines within the Iranian System of Education

The educational system of any country plays a significant role in its sustainable development and progress. However, to fulfill this function there must exist a set of guidelines and policies aimed at such development. The process of setting such a set of guidelines requires a homegrown model for development of the guidelines, and their implementation and supervision. To this end, 14 interviews...

متن کامل

Nurses’ knowledge of evidence- based guidelines for preventing ventilator-associated pneumonia in intensive care units

Background and Purpose: Implementing the guidelines to prevent VAP has been shown to have a significant effect on reducing the incidence of VAP. Studies indicate that ICU staff have poor knowledge and low implementation rate of the standard preventive measures related to VAP. The present study aims to evaluate the knowledge of nurses in the intensive care unit in University hospitals of Sari. ...

متن کامل

پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015