Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases

This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the encrypted database without decrypting it. We use a family of openform and closed-form homomorphism encryption/decryption functions and a comp...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICDEW '06 : 22nd International Conference on Data Engineering Workshops : 3-7 April 2006 S. 98
Hauptverfasser: Sun S. Chung, Ozsoyoglu, G.
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 2006
Schlagworte:
ISBN:9780769525716, 0769525717
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the encrypted database without decrypting it. We use a family of openform and closed-form homomorphism encryption/decryption functions and a computing architecture where (a) the database is encrypted a priori, and (b) for SQL queries expressible in relational algebra, there is no extra query processing cost except for the decryption of the final query output. For complex aggregate queries and nested queries that require extra query processing over the encrypted database, we present query execution strategies. We quantify the additional costs incurred when executing aggregate nested SQL queries over encrypted relational databases, and present detailed experimental results. We observe the crossover points as to when processing a query over an encrypted database is still more advantageous than shipping it over the internet to a secure server housing the original, non-encrypted database, evaluating it and returning the query output to the user.
AbstractList This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the encrypted database without decrypting it. We use a family of openform and closed-form homomorphism encryption/decryption functions and a computing architecture where (a) the database is encrypted a priori, and (b) for SQL queries expressible in relational algebra, there is no extra query processing cost except for the decryption of the final query output. For complex aggregate queries and nested queries that require extra query processing over the encrypted database, we present query execution strategies. We quantify the additional costs incurred when executing aggregate nested SQL queries over encrypted relational databases, and present detailed experimental results. We observe the crossover points as to when processing a query over an encrypted database is still more advantageous than shipping it over the internet to a secure server housing the original, non-encrypted database, evaluating it and returning the query output to the user.
Author Ozsoyoglu, G.
Sun S. Chung
Author_xml – sequence: 1
  surname: Sun S. Chung
  fullname: Sun S. Chung
  organization: Case Western Reserve University
– sequence: 2
  givenname: G.
  surname: Ozsoyoglu
  fullname: Ozsoyoglu, G.
BookMark eNpFjM1KxDAURgMqqGOXrtz0BVpvfpu4K52qAwUVCi6HTHNbIk5bkirM21tQED44m3O-a3I-TiMSckshpxTM_a7a1u85A1A5hzOSmEJDoYxksqDqkiQxfgAANUpLQ69IU46Lz1p7nDGkW7vYg40YH9LXMHUYox-HtByGgINdMH37wuAxptP3KtdjF07zgu4_uyEXvf2MmPxxQ9rHuq2es-blaVeVTeYNLJlEBKEZ6ylyp6QQ6xwiWqCit9JxZIaDtUKLHgvNFXdaHijQQjjZAecbcvd769dqPwd_tOG0p4pxbTj_AS70TOA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICDEW.2006.30
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 98
ExternalDocumentID 1623893
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i90t-5ee04822f1e3d6544544deeea014fa5d3e2930aa484fe78363d85b10174d5c033
IEDL.DBID RIE
ISBN 9780769525716
0769525717
IngestDate Wed Aug 27 02:31:19 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-5ee04822f1e3d6544544deeea014fa5d3e2930aa484fe78363d85b10174d5c033
PageCount 1
ParticipantIDs ieee_primary_1623893
PublicationCentury 2000
PublicationDate 20060000
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 20060000
PublicationDecade 2000
PublicationTitle ICDEW '06 : 22nd International Conference on Data Engineering Workshops : 3-7 April 2006
PublicationTitleAbbrev ICDEW
PublicationYear 2006
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001968591
Score 1.4383494
Snippet This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the...
SourceID ieee
SourceType Publisher
StartPage 98
SubjectTerms Aggregates
Algebra
Computer architecture
Cost function
Cryptography
Data security
Internet
Query processing
Relational databases
Web server
Title Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases
URI https://ieeexplore.ieee.org/document/1623893
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09a8MwED2S0KFT2ial32joWDV2JFtWt5APWighhUCzBVk-lSxOsJ1C_30l24mXLt1sg0CWdHq60713AI-hh0YzLakSPlIeK07tUubUF2hEqCP0ZFwWmxDzebRayUULno5cGEQsk8_w2T2Wd_nJVu9dqGzgW6y2-NqGthCi4mo18RQZOim2yjOXTuPTF7XAzuE9bDQ2B2_jyfSzuosoE6CbyiolsMy6_-vSGfQbhh5ZHLHnHFqYXkD3UKKB1Bbbg_dRWmzoUtnDcUYmqlAOtfIXUvMDbFsy-rIutwumkY-9Uz3OicvqJNNUZz87ex5tmvVhOZsux6-0LqBAN9IraIBo7XM4ND6yJHSqO5wn9g-UdYuMChKGFus9pXjEDTo2B0uiIHY2ypNAe4xdQifdpngFxMnUSB0HAbOzmYRMxZojd7uB1MYocw09NzbrXSWRsa6H5ebvz7dw2kQy7qBTZHu8hxP9XWzy7KGc119HzaCg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH5BNNETKhh_24NHKxvtftQbEQhEJJiQyI103avhMsgYJv73tttgFy_etiVNuravX9_r-74H8Og7qBVTgsrARcojyalZypy6AerAVyE6IsqLTQSTSTifi2kNnvZcGETMk8_w2T7md_nxSm1tqKztGqw2-HoAhx7nHbdga1URFeFbMbbCNxdW5dMNSomd3btfqWy2R6-9_mdxG5GnQFe1VXJoGTT-16lTaFUcPTLdo88Z1DA5h8auSAMpbbYJ426SLelMmuNxSnoykxa3Ni-kZAiYtqT7ZZxuG04jH1ure7whNq-T9BOV_qzNibRq1oLZoD97HdKyhAJdCiejHqKx0E5Hu8hi3-rucB6bP5DGMdLSixkatHek5CHXaPkcLA69yFopjz3lMHYB9WSV4CUQK1QjVOR5zMxn7DMZKY7c7gdCaS31FTTt2CzWhUjGohyW678_P8DxcPY-XoxHk7cbOKniGrdQz9It3sGR-s6Wm_Q-n-Nf1iOj5w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ICDEW+%2706+%3A+22nd+International+Conference+on+Data+Engineering+Workshops+%3A+3-7+April+2006&rft.atitle=Anti-Tamper+Databases%3A+Processing+Aggregate+Queries+over+Encrypted+Databases&rft.au=Sun+S.+Chung&rft.au=Ozsoyoglu%2C+G.&rft.date=2006-01-01&rft.pub=IEEE&rft.isbn=9780769525716&rft.spage=98&rft.epage=98&rft_id=info:doi/10.1109%2FICDEW.2006.30&rft.externalDocID=1623893
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/sc.gif&client=summon&freeimage=true