An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)

V Demertzi, S Demertzis, K Demertzis - Algorithms, 2023 - mdpi.com
The rapid advancements in technology have given rise to groundbreaking solutions and
practical applications in the field of the Industrial Internet of Things (IIoT). These …

Personal data management systems: The security and functionality standpoint

N Anciaux, P Bonnet, L Bouganim, B Nguyen… - Information Systems, 2019 - Elsevier
Riding the wave of smart disclosure initiatives and new privacy-protection regulations, the
Personal Cloud paradigm is emerging through a myriad of solutions offered to users to let …

Improved reconstruction attacks on encrypted data using range query leakage

MS Lacharité, B Minaud… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We analyse the security of database encryption schemes supporting range queries against
persistent adversaries. The bulk of our work applies to a generic setting, where the …

Farview: Disaggregated memory with operator off-loading for database engines

D Korolija, D Koutsoukos, K Keeton, K Taranov… - arXiv preprint arXiv …, 2021 - arxiv.org
Cloud deployments disaggregate storage from compute, providing more flexibility to both the
storage and compute layers. In this paper, we explore disaggregation by taking it one step …

HEDA: multi-attribute unbounded aggregation over homomorphically encrypted database

X Ren, L Su, Z Gu, S Wang, F Li, Y Xie, S Bian… - Proceedings of the …, 2022 - dl.acm.org
Recent years have witnessed the rapid development of the encrypted database, due to the
increasing number of data privacy breaches and the corresponding laws and regulations …

Azure SQL database always encrypted

P Antonopoulos, A Arasu, KD Singh, K Eguro… - Proceedings of the …, 2020 - dl.acm.org
This paper presents Always Encrypted, a recently released feature of Microsoft SQL Server
that uses column granularity encryption to provide cryptographic data protection guarantees …

Building enclave-native storage engines for practical encrypted databases

Y Sun, S Wang, H Li, F Li - Proceedings of the VLDB Endowment, 2021 - dl.acm.org
Data confidentiality is one of the biggest concerns that hinders enterprise customers from
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …

Operon: An encrypted database for ownership-preserving data management

S Wang, Y Li, H Li, F Li, C Tian, L Su, Y Zhang… - Proceedings of the …, 2022 - dl.acm.org
The past decade has witnessed the rapid development of cloud computing and data-centric
applications. While these innovations offer numerous attractive features for data processing …

He3db: An efficient and elastic encrypted database via arithmetic-and-logic fully homomorphic encryption

S Bian, Z Zhang, H Pan, R Mao, Z Zhao, Y Jin… - Proceedings of the …, 2023 - dl.acm.org
As concerns are increasingly raised about data privacy, encrypted database management
system (DBMS) based on fully homomorphic encryption (FHE) attracts increasing research …

Modular order-preserving encryption, revisited

C Mavroforakis, N Chenette, A O'Neill… - Proceedings of the …, 2015 - dl.acm.org
Order-preserving encryption (OPE) schemes, whose ciphertexts preserve the natural
ordering of the plaintexts, allow efficient range query processing over outsourced encrypted …