Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases
This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the encrypted database without decrypting it. We use a family of openform and closed-form homomorphism encryption/decryption functions and a comp...
Saved in:
| Published in: | ICDEW '06 : 22nd International Conference on Data Engineering Workshops : 3-7 April 2006 p. 98 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
2006
|
| Subjects: | |
| ISBN: | 9780769525716, 0769525717 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the encrypted database without decrypting it. We use a family of openform and closed-form homomorphism encryption/decryption functions and a computing architecture where (a) the database is encrypted a priori, and (b) for SQL queries expressible in relational algebra, there is no extra query processing cost except for the decryption of the final query output. For complex aggregate queries and nested queries that require extra query processing over the encrypted database, we present query execution strategies. We quantify the additional costs incurred when executing aggregate nested SQL queries over encrypted relational databases, and present detailed experimental results. We observe the crossover points as to when processing a query over an encrypted database is still more advantageous than shipping it over the internet to a secure server housing the original, non-encrypted database, evaluating it and returning the query output to the user. |
|---|---|
| AbstractList | This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the encrypted database without decrypting it. We use a family of openform and closed-form homomorphism encryption/decryption functions and a computing architecture where (a) the database is encrypted a priori, and (b) for SQL queries expressible in relational algebra, there is no extra query processing cost except for the decryption of the final query output. For complex aggregate queries and nested queries that require extra query processing over the encrypted database, we present query execution strategies. We quantify the additional costs incurred when executing aggregate nested SQL queries over encrypted relational databases, and present detailed experimental results. We observe the crossover points as to when processing a query over an encrypted database is still more advantageous than shipping it over the internet to a secure server housing the original, non-encrypted database, evaluating it and returning the query output to the user. |
| Author | Ozsoyoglu, G. Sun S. Chung |
| Author_xml | – sequence: 1 surname: Sun S. Chung fullname: Sun S. Chung organization: Case Western Reserve University – sequence: 2 givenname: G. surname: Ozsoyoglu fullname: Ozsoyoglu, G. |
| BookMark | eNpFjM1KxDAURgMqqGOXrtz0BVpvfpu4K52qAwUVCi6HTHNbIk5bkirM21tQED44m3O-a3I-TiMSckshpxTM_a7a1u85A1A5hzOSmEJDoYxksqDqkiQxfgAANUpLQ69IU46Lz1p7nDGkW7vYg40YH9LXMHUYox-HtByGgINdMH37wuAxptP3KtdjF07zgu4_uyEXvf2MmPxxQ9rHuq2es-blaVeVTeYNLJlEBKEZ6ylyp6QQ6xwiWqCit9JxZIaDtUKLHgvNFXdaHijQQjjZAecbcvd769dqPwd_tOG0p4pxbTj_AS70TOA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICDEW.2006.30 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EndPage | 98 |
| ExternalDocumentID | 1623893 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIB RIC RIE RIL |
| ID | FETCH-LOGICAL-i90t-5ee04822f1e3d6544544deeea014fa5d3e2930aa484fe78363d85b10174d5c033 |
| IEDL.DBID | RIE |
| ISBN | 9780769525716 0769525717 |
| IngestDate | Wed Aug 27 02:31:19 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-5ee04822f1e3d6544544deeea014fa5d3e2930aa484fe78363d85b10174d5c033 |
| PageCount | 1 |
| ParticipantIDs | ieee_primary_1623893 |
| PublicationCentury | 2000 |
| PublicationDate | 20060000 |
| PublicationDateYYYYMMDD | 2006-01-01 |
| PublicationDate_xml | – year: 2006 text: 20060000 |
| PublicationDecade | 2000 |
| PublicationTitle | ICDEW '06 : 22nd International Conference on Data Engineering Workshops : 3-7 April 2006 |
| PublicationTitleAbbrev | ICDEW |
| PublicationYear | 2006 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001968591 |
| Score | 1.4383494 |
| Snippet | This paper is about anti-tamper databases, where the database contents are encrypted for security in a way to allow efficient query processing directly on the... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 98 |
| SubjectTerms | Aggregates Algebra Computer architecture Cost function Cryptography Data security Internet Query processing Relational databases Web server |
| Title | Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases |
| URI | https://ieeexplore.ieee.org/document/1623893 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07a8MwED6S0KFT2ialbzR0rBo7lvzoFvKghRJSCDRbkKVzyeIE2yn03_dkO_HSpZtlEEg6jk93uu87gEfpaPID1FyJUHOh0fBYJoLHxteu0Zb6GJfNJoL5PFytokULno5cGEQsi8_w2X6Wb_lmq_c2VTZwCasJX9vQDoKg4mo1-ZTIt1JsVWQeWY1PN6gFdg5jv9HYHLyNJ9PP6i2iLIBuOquUwDLr_m9JZ9BvGHpsccSec2hhegHdQ4sGVntsD95HabHhS0WX44xNVKEsauUvrOYH0Fw2-qKQ2ybT2Mfeqh7nzFZ1smmqs58d3UebaX1YzqbL8SuvGyjwTeQUXCKSfw6HiYue8a3qjhCGdqAoLEqUNB4S1juKrCQStGwOz4Qytj4qjNSO511CJ92meAUsDtB1UEoPw1goj8JxrQ2FUipKyLS-fw09ezbrXSWRsa6P5ebv37dw2mQy7qBTZHu8hxP9XWzy7KG06y9uQqFM |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFH5BNNETKhh_24NHKxttx-aNCAQiEkyWyI107ZvhMsgYJv73tttgFy_e1iVN2r68fH2v7_sewKNwlPEDVFRyX1GuUNNIxJxG2lOuVpb6GOXNJrrTqT-fB7MaPO25MIiYF5_hs_3M3_L1Sm1tqqztGqw2-HoAh4LzjluwtaqMSuBZMbYiNg-syqfbLSV2dmOvUtlsj1_7g8_iNSIvga56q-TQMmz8b1Gn0Ko4emS2R58zqGFyDo1dkwZS-mwTJr0kW9JQmutxSvoykxa3Ni-kZAiYuaT3ZYJum04jH1ure7whtq6TDBKV_qzNjbSa1oJwOAhfR7RsoUCXgZNRgWg8tNOJXWTas7o7nGuzA2kCo1gKzdCgvSONnXiMls_BtC8i66VcC-UwdgH1ZJXgJZCoi66DQjD0Iy6ZCciV0iaYkkFsjOt5V9C0Z7NYFyIZi_JYrv_-_QDHo_B9spiMp283cFLlNW6hnqVbvIMj9Z0tN-l9buNfBa-kkw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ICDEW+%2706+%3A+22nd+International+Conference+on+Data+Engineering+Workshops+%3A+3-7+April+2006&rft.atitle=Anti-Tamper+Databases%3A+Processing+Aggregate+Queries+over+Encrypted+Databases&rft.au=Sun+S.+Chung&rft.au=Ozsoyoglu%2C+G.&rft.date=2006-01-01&rft.pub=IEEE&rft.isbn=9780769525716&rft.spage=98&rft.epage=98&rft_id=info:doi/10.1109%2FICDEW.2006.30&rft.externalDocID=1623893 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/sc.gif&client=summon&freeimage=true |

