ANALYZING CLIENT-SIDE ENCRYPTION IMPLEMENTED IN CRYPTDB
DOI:
https://doi.org/10.22373/cs.v2i1.2852Keywords:
security, database, cryptographyAbstract
Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption. It allows users to protect their data and prohibit access to that data from unauthorized user. Here, key use for encryption and decryption are all belong and known only to the user. On the other words, data stored in the database are all in encrypted form. CryptDB, a new cryptographic technique, where the system acts as a proxy to protect the communication between the application server and database server, implementing the idea. The aim of this study is to look into more detail about the encryption scheme implemented in CryptDB in 2 different case study, using SEARCH command with the condition given. The result of the study will present how the statement change with the act of proxy, and the encryption scheme implemented here.References
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB : Protecting confidentiality with encrypted query processing. In Proc. of the 3rd SOSP, pages 85-100, Cascais, Portugal, Oct 2011
M. G. Solomon, V. Sunderam, L. Xiong , Towards Secure Cloud Database with fine-grained access control Book of Data and Application Security and Privacy, pages 324-338 , Springer berlin Heidelberg, 2014
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB : A practical encrypted relational DBMS. In Proc. of 23rd ACM Symposium on Operating Systems Principles, pages 85-100, USA, 2011
S. Tu , M.F. Kaashoek, S. Madden, N. Zeldovich. Processing analytical queries over encrypted data. In Proc. of the VLDB Endowment Volume 6, pages 289-300, March 2013
R. A. Popa, F. H. li, N. Zeldovich . An ideal-security protocol for order-preserving encoding.
In Proc Sp'13 of the 2013 IEEE Symposium on Security and Privacy, pages 463-477, Washington, DC, USA, 2013
CryptDB https://css.csail.mit.edu/cryptdb/
S. Tu , M.F. Kaashoek, S. Madden, N. Zeldovich. Processing analytical queries over encrypted data. . In Proc. of the VLDB Endowment Volume 6, pages 289-300, March 2013
A. Boldyreva, N. Chenette, Y.Lee, A. O'Neil. Order-Preserving Symmetric Encryption.
In Proc of the 28th Annual International Conference on Advances in Cryptology : The Theory and Applications of Cryptographic Techniques, pages 224-241, Berlin, Heidelberg, 2009
CryptDB source Code, available at https://github.com/CryptDB/cryptdb
D. X. Song, D. Wagner, A. Perrig. Practical Techniques for Search on Encrypted Data.
In Proc of the 2000 IEEE Symposium on Security and Privacy, page 44, USA, 2000
Downloads
Published
Issue
Section
License
Authors who publish with Cyberspace Journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).