Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach

Author(s):  
Simin Ghasemi ◽  
Morteza Noferesti ◽  
Mohammad Ali Hadavi ◽  
Sadegh Dorri Nogoorani ◽  
Rasool Jalili
Keyword(s):  
2015 ◽  
Vol 34 (4) ◽  
pp. 505-534 ◽  
Author(s):  
Mohammad Ali Hadavi ◽  
Rasool Jalili ◽  
Leila Karimi

2018 ◽  
Vol 115 ◽  
pp. 1-19 ◽  
Author(s):  
Mohammad Etemad ◽  
Alptekin Küpçü
Keyword(s):  

2015 ◽  
Vol 52 ◽  
pp. 680-684 ◽  
Author(s):  
Miyoung Jang ◽  
Min Yoon ◽  
Youngho Song ◽  
Jae-Woo Chang

2010 ◽  
Vol 4 (1) ◽  
pp. 1-17 ◽  
Author(s):  
Sergei Evdokimov ◽  
Matthias Fischmann ◽  
Oliver Günther

Database outsourcing has become popular in recent years, although it introduces substantial security and privacy risks. In many applications, users may not want to reveal their data even to a generally trusted database service provider. Several researchers have proposed encryption schemes, such as privacy homomorphisms, that allow service providers to process confidential data sets without learning too much about them. In this paper, the authors discuss serious flaws of these solutions. The authors then present a new definition of security for homomorphic database encryption schemes that avoids these flaws and show that it is difficult to build a privacy homomorphism that complies with this definition. As a practical compromise, the authors present a relaxed variant of the security definition and discuss arising security implications. They present a new method to construct encryption schemes for exact selects and prove that the resulting schemes satisfy this notion.


Sign in / Sign up

Export Citation Format

Share Document