IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • International Journal of Information Security Science
  • Volume:3 Issue:1
  • Secure Database in Cloud Computing - CryptDB Revisited

Secure Database in Cloud Computing - CryptDB Revisited

Authors : Ziynet DAYIOĞLU
Pages : 129-147
View : 37 | Download : 12
Publication Date : 2014-03-31
Article Type : Research Paper
Abstract :Databases contain most valuable personal, economic, and government information. They are most desirable to the malicious adversaries and therefore, it is very critical to protect against all possible adversarial behavior. With the recent rapid growth in the availability and popularity of cloud services, many personal and business and government information are now moving to the Cloud. Therefore, databases are more difficult to protect because of new security and privacy issues. Various techniques have been proposed to solve the outsourcing database scenarios which preserve a certain degree of confidentiality while still allowing to execute some SQL queries efficiently. CryptDB is a new database management system for protecting data confidentiality while preserving confidentiality and performing a standard set of SQL queries in an efficient way. CryptDB seems to be practical compared to other attempts at solving the problem of computing with encrypted data and the database can be fully moved to the Cloud with no security concern because all the data are already encrypted and never revealed to the database administrator. In this paper, we revisit CryptDB from cryptographic point of view. We first describe it in more details for ease of understanding and then highlight the drawbacks of CryptDB from security and efficiency points of view.
Keywords : Secure Database, Encrypted Search, Cryptographic Protocol, Proxy Server

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026