2017
DOI: 10.1007/978-3-319-64283-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Enforcing Privacy in Cloud Databases

Abstract: Abstract. Outsourcing databases, i.e., resorting to Database-as-a-Service (DBaaS), is nowadays a popular choice due to the elasticity, availability, scalability and pay-as-you-go features of cloud computing. However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons. In this paper, we survey the mechanisms that aim at making databases secure in a cloud environment, and discuss current pitfalls and related research … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 70 publications
(80 reference statements)
0
2
0
Order By: Relevance
“…It also uses a reliable proxy server to store encryption keys, database schema and onion layers of all attributes. Moreover the data encryption, rewriting queries and decryption of results are the responsibility of the proxy [17]. In order to process the query, the proxy checks the required attributes and then considers the suitable layer.…”
Section: Homomorphic Encryption Based Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It also uses a reliable proxy server to store encryption keys, database schema and onion layers of all attributes. Moreover the data encryption, rewriting queries and decryption of results are the responsibility of the proxy [17]. In order to process the query, the proxy checks the required attributes and then considers the suitable layer.…”
Section: Homomorphic Encryption Based Methodsmentioning
confidence: 99%
“…Furthermore, onion layers create overhead, especially in the case of large tables. It should be stated that CryptDB cannot support string LIKE queries and analytic queries [17].…”
Section: Homomorphic Encryption Based Methodsmentioning
confidence: 99%
“…Mousa et al [33] discover the various risks to DB safety in their analysis through the unstructured research study. Moghadam et al [15] did an investigation on cloud servers to figure out all conceivable threats.…”
Section: Related Workmentioning
confidence: 99%
“…When a DB is outsourced to the cloud, cloud platforms introduce security challenges such as unreliable service providers, malicious cloud employees, data protection, consistency, and scalability. With cloud DBs becoming increasingly susceptible to both external and internal threats, traditional and conventional security measures are insufficient for their protection [15,16].…”
Section: Introductionmentioning
confidence: 99%