Title
Executing SQL over encrypted data in the database-service-provider model
Abstract
Rapid advances in networking and Internet technologies have fueled the emergence of the "software as a service" model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet, electronic mail services, general storage services, disaster protection services. "Database as a Service" model provides users power to create, store, modify, and retrieve data from anywhere in the world, as long as they have access to the Internet. It introduces several challenges, an important issue being data privacy. It is in this context that we specifically address the issue of data privacy.There are two main privacy issues. First, the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second, data needs to be protected even from the service providers, if the providers themselves cannot be trusted. In this paper, we focus on the second challenge. Specifically, we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers' site, without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented.
Year
DOI
Venue
2002
10.1145/564691.564717
SIGMOD Conference
Keywords
Field
DocType
database-service-provider model,client site,service-provider site,disaster protection service,service provider,general storage service,electronic mail service,data privacy,sql query,data theft,executing sql,encrypted data,business intelligence,it security,service model,software as a service,dynamic content,knowledge
SQL,Data mining,World Wide Web,Computer science,Software as a service,Encryption,Service provider,Business intelligence,Information privacy,Database encryption,Database,The Internet
Conference
ISBN
Citations 
PageRank 
1-58113-497-5
568
27.75
References 
Authors
5
4
Search Limit
100568
Name
Order
Citations
PageRank
Hakan HacigümüŞ167633.15
Bala Iyer2102472.28
Chen Li32816196.16
Sharad Mehrotra470971001.95