Abstract
A way to prevent, delay, limit, or contain the compromise of the protected data in a database is to encrypt the data and the database schema, and yet allow queries and transactions over the encrypted data. Clearly, there is a compromise between the degree of security provided by encryption and the efficient querying of the database. In this paper, we investigate the capabilities and limitations of encrypting the database in relational databases, and yet allowing, to the extent possible, efficient SQL querying of the encrypted database.
We concentrate on integer-valued attributes, and investigate a family of open-form and closed-form homomorphism encryption/decryption functions, the associated query transformation problems, inference control issues, and how to handle overflow and precision errors.
Chapter PDF
Similar content being viewed by others
Key words
References
Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys 21(4): 515–556 (1989)
Blum, M., Micali, S., “How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits”, SIAM Journal on Computing, 13 (1984), 850–864.
Hakan Hacigumus, Balakrishna R. Iyer, Sharad Mehrotra: Providing Database as a Service. IEEE ICDE 2002
Hakan Hacigumus, Balakrishna R. Iyer, Chen Li, Sharad Mehrotra: Executing SQL over encrypted data in the database-service-provider model. ACM SIGMOD Conference 2002: 216–227
Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165–195 (2001)
Melvin J. Maron. Numerical Analysis-A Practical Approach, 1985 Macmillan Publishing Co., Inc.
Menezes, A.J, van Oorschot, P.C. and Vanstone, S.A., Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997, page 239.
Goldberg, D., “What Every Computer Scientist Should Know About Floating Point Arithmetic”, ACM Computing Surveys, 1991, available at http://citeseer.nj.nec.com/goldberg91what.html
Ozsoyoglu, G., Singer, D., Chung, S., “Querying Encrypted Databases”, Tech. Report, EECS, CWRU.
Xiaolei Qian, Teresa F. Lunt: A Semantic Framework of the Multilevel Secure Relational Model. IEEE TKDE 9(2): 292–301 (1997)
R. L. Rivest, L. Adleman and M.L. Dertouzos, On data banks and privacy homomorphisms, in R. A. DeMillo et al., eds., Foundations of Secure Computation, Academic Press, New York, 1978, 169–179.
Database Management Systems, R. Ramakrishnan, J. Gehrke, McGraw-Hill, 2000.
Eisengerg, A., Melton, J., “Sql: 1999, formerly known as sql 3”, ACM SIGMOD Record, 28(1), 131–138, 1999.
Richard Startz. 8087/80287/80387-Applications and Programming with Intel’s Math Coprocessors. 1988 Brandy Books, a division of Simon & Schuster, Inc.
Ullman, J.D., “Principles of Database and Knowledge-Base Systems”, Vol 1., Computer Science Press, 1989.
Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001:38–47
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Ozsoyoglu, G., Singer, D.A., Chung, S.S. (2004). Anti-Tamper Databases. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds) Data and Applications Security XVII. IFIP International Federation for Information Processing, vol 142. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8070-0_10
Download citation
DOI: https://doi.org/10.1007/1-4020-8070-0_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8069-2
Online ISBN: 978-1-4020-8070-8
eBook Packages: Springer Book Archive