89
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Enabling Secure Database as a Service using Fully Homomorphic Encryption: Challenges and Opportunities

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solutions. A recent breakthrough in the cryptographic community (in 2009) related to fully homomorphic encryption (FHE) showed that arbitrary computation on encrypted data is possible. Successful adoption of FHE for query processing is, however, still a distant dream, and numerous challenges have to be addressed. One challenge is how to perform algebraic query processing of encrypted data, where we produce encrypted intermediate results and operations on encrypted data can be composed. In this paper, we describe our solution for algebraic query processing of encrypted data, and also outline several other challenges that need to be addressed, while also describing the lessons that can be learnt from a decade of work by the database community in querying encrypted data.

          Related collections

          Most cited references4

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Fully Homomorphic Encryption over the Integers

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Computing arbitrary functions of encrypted data

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Order-Preserving Symmetric Encryption

                Bookmark

                Author and article information

                Journal
                1302.2654

                Databases,Security & Cryptology
                Databases, Security & Cryptology

                Comments

                Comment on this article