搜索结果: 1-15 共查到“Databases”相关记录133条 . 查询时间(0.078 秒)
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
searchable encryption blind indexing SQL database security
2019/7/15
Rapid advances in Internet technologies have fostered the emergence of the “software as a service” model for enterprise computing. The “Database as a Service” model provides users with the power to cr...
SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
encrypted databases leakage-abuse attack mitigation searchable encryption
2019/7/15
Building expressive encrypted databases that can scale to large volumes of data while enjoying formal security guarantees has been one of the holy grails of security and cryptography research. Searcha...
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Encrypted Database Attack Range Query
2019/5/5
Recent foundational work on leakage-based attacks on encrypted databases has broadened our understanding of what an adversary can accomplish with a standard leakage profile. Nevertheless, all known va...
We introduce and study the notion of keyless fuzzy search (KlFS) which allows to mask a publicly available database in such a way that any third party can retrieve content if and only if it possesses ...
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
private queries encrypted database homomorphic encryption
2019/4/3
To achieve security and privacy for data stored on the cloud, we need the ability to secure data in compute. Equality comparisons, ``x=y,x≠yx=y,x≠y'', have been widely studied with many proposals but ...
Encrypted Databases for Differential Privacy
structured encryption differential privacy statistical databases
2018/11/14
The problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these databases, however, ha...
Practical Attacks on Relational Databases Protected via Searchable Encryption
searchable symmetric encryption relational databases inference attacks
2018/8/2
Searchable symmetric encryption (SSE) schemes are commonly proposed to enable search in a protected unstructured documents such as email archives or any set of sensitive text files. However, some SSE ...
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2018/8/2
Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of data recovery for encrypted databases that support rich queries such as range queries. In this paper, we d...
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
Cryptography Protocols Multi-Party Computation
2018/5/22
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it...
Private Nearest Neighbors Classification in Federated Databases
Multi-Party Computation Text Classification Machine Learning
2018/3/29
Privacy-preserving data analysis in the context of federated databases distributed across multiple parties has the potential to produce richer and more accurate models than what each party can learn w...
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
verifiable computation interactive arguments verifiable database queries
2017/11/28
Cloud database systems such as Amazon RDS or Google Cloud SQL enable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify t...
The Tao of Inference in Privacy-Protected Databases
inference attacks encrypted databases privacy
2017/11/13
To protect database confidentiality even in the face of full compromise while supporting standard functionality, recent academic proposals and commercial products rely on a mix of encryption schemes. ...
Database management systems operating over encrypted data are gaining significant commercial interest. CryptDB is one such notable system supporting a variety SQL queries over encrypted data (Popa et ...
Privacy for Distributed Databases via (Un)linkable Pseudonyms
pseudonyms unlinkability data exchange
2017/2/20
When data maintained in a decentralized fashion needs to be synchronized or exchanged between different databases, related data sets usually get associated with a unique identifier. While this approac...