skip to main content
10.1145/2462410.2462888acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
keynote

Searching over encrypted data in cloud systems

Published: 12 June 2013 Publication History

Abstract

Security is still a major inhibitor of cloud computing. When companies are testing cloud applications, e.g. for storage or databases, they use generated data for fear of data loss. Modern encrypted databases where the cryptographic key remains at the client provide a solution to this problem. Recent results in cryptography, such order-preserving encryption, and database systems enable the practical use of these systems. We report on our pre-development efforts of implementing such an encrypted database in an in-memory, column store database. We highlight some unsolved research challenges: such as access control, infrequent queries and security vs. performance query optimization. Challenges to key management in multi-user environments remain largely unsolved. We give an overview of the architecture and performance benchmarks on our prototype which are very encouraging for practical adoption.

References

[1]
S. Hildenbrand, D. Kossmann, T. Sanamrad, C. Binnig, F. Farber, and J. Wöhler. Query processing on encrypted data in the cloud. Department of Computer Science, Technical Report 735, ETH Zürich, 2011.
[2]
F. Kerschbaum. Collusion-resistant outsourcing of private set intersection. In Proceedings of the 27th ACM Symposium On Applied Computing (SAC), 2012.
[3]
R. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: Protecting confidentiality with encrypted query processing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), 2011.

Cited By

View all
  • (2016)Biometrie data emulation and encryption for sport wearable devices (A case study)2016 Annual IEEE Systems Conference (SysCon)10.1109/SYSCON.2016.7490577(1-6)Online publication date: Apr-2016
  • (2015)Security transparency: the next frontier for security research in the cloudJournal of Cloud Computing10.1186/s13677-015-0037-54:1Online publication date: 2-Jun-2015
  • (2014)Trusting the CloudProceedings of the 2014 IEEE International Conference on Cloud Computing10.1109/CLOUD.2014.92(652-658)Online publication date: 27-Jun-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
June 2013
278 pages
ISBN:9781450319508
DOI:10.1145/2462410
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2013

Check for updates

Author Tags

  1. cloud
  2. database
  3. encryption

Qualifiers

  • Keynote

Conference

SACMAT '13
Sponsor:

Acceptance Rates

SACMAT '13 Paper Acceptance Rate 19 of 62 submissions, 31%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Biometrie data emulation and encryption for sport wearable devices (A case study)2016 Annual IEEE Systems Conference (SysCon)10.1109/SYSCON.2016.7490577(1-6)Online publication date: Apr-2016
  • (2015)Security transparency: the next frontier for security research in the cloudJournal of Cloud Computing10.1186/s13677-015-0037-54:1Online publication date: 2-Jun-2015
  • (2014)Trusting the CloudProceedings of the 2014 IEEE International Conference on Cloud Computing10.1109/CLOUD.2014.92(652-658)Online publication date: 27-Jun-2014
  • (2014)Re-Identification Risk Based Security ControlsProceedings of the Confederated International Workshops on On the Move to Meaningful Internet Systems: OTM 2014 Workshops - Volume 884210.1007/978-3-662-45550-0_14(99-107)Online publication date: 27-Oct-2014
  • (2013)Use of cryptography in cloud computing2013 IEEE International Conference on Control System, Computing and Engineering10.1109/ICCSCE.2013.6719955(179-184)Online publication date: Nov-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media