Skip to main content

Efficient Key Updates in Encrypted Database Systems

  • Conference paper
Secure Data Management (SDM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3674))

Included in the following conference series:

Abstract

In this paper, we investigate efficient key updates in encrypted database environments. We study the issues in the context of database-as-a-service (DAS) model that allows organizations to outsource their data management infrastructures to a database service provider. In the DAS model, a service provider employs data encryption techniques to ensure the privacy of hosted data. The security of encryption techniques relies on the confidentiality of the encryption keys. The dynamic nature of the encrypted database in the DAS model adds complexity and raises specific requirements on the key management techniques. Key updates are particularly critical because of their potential impact on overall system performance and resources usage. In this paper, we propose specialized techniques and data structures to efficiently implement the key updates along with the other key management functions to improve the systems’ concurrency performance in the DAS model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of VLDB (2002)

    Google Scholar 

  2. Chaudhuri, S., Christensen, E., Graefe, G., Narasayya, V.R., Zwilling, M.J.: Self-tuning technology in microsoft sql server. Data Engineering Bulletin 22(2), 20–26 (1999)

    Google Scholar 

  3. Computer Security Institute. CSI/FBI Computer Crime and Security Survey (2002), http://www.gocsi.com

  4. ComputerWorld. Business Process Outsourcing (January 01, 2001)

    Google Scholar 

  5. Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted Relational DBMSs. In: Proc. of 10th ACM Conf. On Computer and Communications Security (2003)

    Google Scholar 

  6. Fernandez, B., Summers, R.C., Wood, C.: Database Security and Integrity. Addison-Wesley, Reading (1981)

    Google Scholar 

  7. Hacıgümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in Database Service Provider Model. In: Proc. of ACM SIGMOD (2002)

    Google Scholar 

  8. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: Proc. of ICDE (2002)

    Google Scholar 

  9. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Ensuring the Integrity of Encrypted Databases in Database as a Service Model. In: Proc. of 17th IFIP WG 11.3 Conference on Data and Applications Security (2003)

    Google Scholar 

  10. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125–136. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Hacıgümüş, H., Mehrotra, S.: Performance-Conscious Key Management in Encrypted Databases. In: Proc. of 18th IFIP WG 11.3 Conference on Data and Applications Security (2004)

    Google Scholar 

  12. He, J., Wang, M.: Cryptography and relational database management systems. In: Proc. of IDEAS 2001 (2001)

    Google Scholar 

  13. Lunt, T., Fernandez, E.B.: Database Security. ACM SIGMOD Record 19(4) (1990)

    Google Scholar 

  14. Menezes, D.R., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  15. Mohan, C.: ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes. In: Proc. of VLDB (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hacıgümüş, H., Mehrotra, S. (2005). Efficient Key Updates in Encrypted Database Systems. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2005. Lecture Notes in Computer Science, vol 3674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552338_1

Download citation

  • DOI: https://doi.org/10.1007/11552338_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28798-8

  • Online ISBN: 978-3-540-31974-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics