Abstract
In this paper, we investigate efficient key updates in encrypted database environments. We study the issues in the context of database-as-a-service (DAS) model that allows organizations to outsource their data management infrastructures to a database service provider. In the DAS model, a service provider employs data encryption techniques to ensure the privacy of hosted data. The security of encryption techniques relies on the confidentiality of the encryption keys. The dynamic nature of the encrypted database in the DAS model adds complexity and raises specific requirements on the key management techniques. Key updates are particularly critical because of their potential impact on overall system performance and resources usage. In this paper, we propose specialized techniques and data structures to efficiently implement the key updates along with the other key management functions to improve the systems’ concurrency performance in the DAS model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of VLDB (2002)
Chaudhuri, S., Christensen, E., Graefe, G., Narasayya, V.R., Zwilling, M.J.: Self-tuning technology in microsoft sql server. Data Engineering Bulletin 22(2), 20–26 (1999)
Computer Security Institute. CSI/FBI Computer Crime and Security Survey (2002), http://www.gocsi.com
ComputerWorld. Business Process Outsourcing (January 01, 2001)
Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted Relational DBMSs. In: Proc. of 10th ACM Conf. On Computer and Communications Security (2003)
Fernandez, B., Summers, R.C., Wood, C.: Database Security and Integrity. Addison-Wesley, Reading (1981)
Hacıgümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in Database Service Provider Model. In: Proc. of ACM SIGMOD (2002)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: Proc. of ICDE (2002)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Ensuring the Integrity of Encrypted Databases in Database as a Service Model. In: Proc. of 17th IFIP WG 11.3 Conference on Data and Applications Security (2003)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125–136. Springer, Heidelberg (2004)
Hacıgümüş, H., Mehrotra, S.: Performance-Conscious Key Management in Encrypted Databases. In: Proc. of 18th IFIP WG 11.3 Conference on Data and Applications Security (2004)
He, J., Wang, M.: Cryptography and relational database management systems. In: Proc. of IDEAS 2001 (2001)
Lunt, T., Fernandez, E.B.: Database Security. ACM SIGMOD Record 19(4) (1990)
Menezes, D.R., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Mohan, C.: ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes. In: Proc. of VLDB (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hacıgümüş, H., Mehrotra, S. (2005). Efficient Key Updates in Encrypted Database Systems. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2005. Lecture Notes in Computer Science, vol 3674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552338_1
Download citation
DOI: https://doi.org/10.1007/11552338_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28798-8
Online ISBN: 978-3-540-31974-0
eBook Packages: Computer ScienceComputer Science (R0)