Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/564691.564717acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

Executing SQL over encrypted data in the database-service-provider model

Published: 03 June 2002 Publication History
  • Get Citation Alerts
  • Abstract

    Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context that we specifically address the issue of data privacy.There are two main privacy issues. First, the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second, data needs to be protected even from the service providers, if the providers themselves cannot be trusted. In this paper, we focus on the second challenge. Specifically, we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers' site, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented.

    References

    [1]
    AES. Advanced Encryption Standard. National Institute of Science and Technology, FIPS 197, 2001.
    [2]
    D. Song and D. Wagner and A. Perrig. Search on encrypted data. In Proc. of IEEE SRSP, 2000.
    [3]
    DES. Data Encryption Standard. FIPS PUB 46, Federal Information Processing Standards Publication, 1977.
    [4]
    H. Garcia-Molina, J. Ullman, and J. Widom. Database Systems: The Complete Book. Prentice Hall, 2002.
    [5]
    H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in Database-Service-Provider Model. Technical Report TR-DB-02-02, Database Research Group at University of California, Irvine, 2002.
    [6]
    H. Hacigümüş, B. Iyer, and S. Mehrotra. Providing Database as a Service. In Proc. of ICDE, 2002.
    [7]
    Y. E. Ioannidis and V. Poosala. Histogram-based approximation of set-valued query answers. In Proc. of VLDB, pages 174-185, 1999.
    [8]
    H. V. Jagadish, H. Jin, B. C. Ooi, and K.-L. Tan. Global optimization of histograms. In Proc. of ACM SIGMOD, 2001.
    [9]
    G. Piatatetsky-Shapiro and C. Connell. Accurate estimation of the number of tuples satisfying a condition. In Proc. of ACM SIGMOD, 1984.
    [10]
    R. L. Rivest and L. M. Adleman and M. L. Dertouzos. On Data Banks and Privacy Homomorphisms. In Foundations of Secure Computation, pages 169-178, 1978.
    [11]
    R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    [12]
    B. Schneier. Description of a new variable-length key, block cipher (blowfish), fast software encryption. In Cambridge Security Workshop Proceedings, 1994.
    [13]
    A. Silberschatz, H. F. Korth, and S. Sudarshan. Database System Concepts, 3rd Edition. McGraw-Hill Book Company, 1997.
    [14]
    TPC-H. Benchmark Specification. http://www.tpc.org.
    [15]
    M. Winslett and J. D. Ullman. Jeffrey D. Ullman speaks out on the future of higher education, startups, database theory, and more. SIGMOD Record, 30(3), 2001.

    Cited By

    View all
    • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
    • (2024)Towards Practical Oblivious Join ProcessingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.331003836:4(1829-1842)Online publication date: Apr-2024
    • (2024) Prism: Pr ivacy-Preserving and Ver i fiable S et Computation Over M ulti-Owner Secret Shared Outsourced Databases IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327935621:3(1355-1371)Online publication date: May-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGMOD '02: Proceedings of the 2002 ACM SIGMOD international conference on Management of data
    June 2002
    654 pages
    ISBN:1581134975
    DOI:10.1145/564691
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 June 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    SIGMOD/PODS02

    Acceptance Rates

    SIGMOD '02 Paper Acceptance Rate 42 of 240 submissions, 18%;
    Overall Acceptance Rate 785 of 4,003 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)97
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional DataInternational Journal of Web Services Research10.4018/IJWSR.34039121:1(1-17)Online publication date: 9-Apr-2024
    • (2024)Towards Practical Oblivious Join ProcessingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.331003836:4(1829-1842)Online publication date: Apr-2024
    • (2024) Prism: Pr ivacy-Preserving and Ver i fiable S et Computation Over M ulti-Owner Secret Shared Outsourced Databases IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327935621:3(1355-1371)Online publication date: May-2024
    • (2024)Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00444(5560-5573)Online publication date: 13-May-2024
    • (2024)Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing DataEdge Computing – EDGE 202310.1007/978-3-031-51826-3_7(69-81)Online publication date: 18-Jan-2024
    • (2023)Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving TechniquesInternational Journal of Web Services Research10.4018/IJWSR.33138820:1(1-18)Online publication date: 5-Oct-2023
    • (2023)Technique for Searching Data in a Cryptographically Protected SQL DatabaseApplied Sciences10.3390/app13201152513:20(11525)Online publication date: 20-Oct-2023
    • (2023)Demo of QueryBooster: Supporting Middleware-Based SQL Query Rewriting as a ServiceProceedings of the VLDB Endowment10.14778/3611540.361161516:12(4038-4041)Online publication date: 1-Aug-2023
    • (2023)Efficient Bi-objective SQL Optimization for Enclaved Cloud Databases with Differentially Private PaddingACM Transactions on Database Systems10.1145/359702148:2(1-40)Online publication date: 26-Jun-2023
    • (2023)Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel CachingProceedings of the ACM on Management of Data10.1145/35889201:1(1-23)Online publication date: 30-May-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media