Computationally secure dbms based on order-preserving encryption | Applied Discrete Mathematics. Supplement. 2014. № 7.

Computationally secure dbms based on order-preserving encryption

The paper presents a computationally secure database management system based on order-preserving encryption. The threat model is the following: the DB server is leased to the client thus the DB server is untrusted; the threat is a malicious database administrator who tries to learn private data by snooping on the DB server. To protect data confidentiality against this threat, it is proposed to execute queries over encrypted data on the untrusted server. Namely, to perform order operations on ciphertexts in the same way as on plaintexts, an order-preserving encryption, in particular mOPE scheme, is used. The mOPE scheme achieves IND-OCPA security, where an adversary learns no information about the plaintexts besides order. A MySQL plugin that implements a NoSQL protocol for MySQL server is developed. The NoSQL client/server protocol supports simple operations on private data, in particular it ranges queries over encrypted data. The protocol allows client applications to communicate remotely with MySQL storage engines.

Download file
Counter downloads: 340

Keywords

защищённая СУБД, недоверенный сервер БД, шифр с сохранением порядка, NoSQL-протокол, secure DBMS, untrusted DB server, order-preserving encryption, NoSQL protocol

Authors

NameOrganizationE-mail
Glotov Iigor.n.glotov@gmail.com
Ovsyannikov S.naphaso@gmail.com
Trenkaev V.tvnik@sibmail.com
Всего: 3

References

Жиров А. О., Жирова А. О., Кренделев С. Ф. Безопасные облачные вычисления с помощью гомоморфной криптографии // БИТ. 2013. Т. 1. С. 6-12.
Popa R. A., Li F. H., and Zeldovich N. An ideal-security protocol for order-preserving encoding // IEEE Symp. Security and Privacy. San Francisco, CA, USA, May 23-24, 2013. P. 463-477.
Boldyreva A., ChenetteN., Lee Y., and O'Neill A. Order-preserving symmetric encryption // EUROCRYPT'09. LNCS. 2009. V. 5479. P. 224-241.
Papa R. A., Redfield C. M. S., Zeldovich N., and Balakrishnan H. CryptDB: protecting confidentiality with encrypted query processing // Proc. Twenty-Third ACM Symp. Operating Systems Principles (SOSP'11). New York, NY, USA, 2011. P. 85-100.
 Computationally secure dbms based on order-preserving encryption | Applied Discrete Mathematics. Supplement. 2014. № 7.

Computationally secure dbms based on order-preserving encryption | Applied Discrete Mathematics. Supplement. 2014. № 7.