Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Improved reconstruction attacks on encrypted data using range query leakage

MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …

Pump up the volume: Practical database reconstruction from volume leakage on range queries

P Grubbs, MS Lacharité, B Minaud… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present attacks that use only the volume of responses to range queries to reconstruct
databases. Our focus is on practical attacks that work for large-scale databases with many …

Revisiting leakage abuse attacks

L Blackstone, S Kamara, T Moataz - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Encrypted search algorithms (ESA) are cryptographic algorithms that support search over
encrypted data. ESAs can be designed with various primitives including …

Cloud computing security: foundations and research directions

A Chakraborti, R Curtmola, J Katz… - … and Trends® in …, 2022 - nowpublishers.com
Cloud services have revolutionized modern computing. The benefits of outsourcing data and
computation come with security and privacy concerns. This monograph explores the …

StealthDB: a scalable encrypted database with full SQL query support

D Vinayagamurthy, A Gribov… - Proceedings on Privacy …, 2019 - petsymposium.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …

{SEAL}: Attack mitigation for encrypted databases via adjustable leakage

I Demertzis, D Papadopoulos, C Papamanthou… - 29th USENIX security …, 2020 - usenix.org
Building expressive encrypted databases that can scale to large volumes of data while
enjoying formal security guarantees has been one of the holy grails of security and …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

SQL on structurally-encrypted databases

S Kamara, T Moataz - Advances in Cryptology–ASIACRYPT 2018: 24th …, 2018 - Springer
We show how to encrypt a relational database in such a way that it can efficiently support a
large class of SQL queries. Our construction is based solely on structured encryption (STE) …