Title
Pushing the Limits of Encrypted Databases with Secure Hardware.
Abstract
Encrypted databases have been studied for more than 10 years and are quickly emerging as a critical technology for the cloud. The current state of the art is to use property-preserving encrypting techniques (e.g., deterministic encryption) to protect the confidentiality of the data and support query processing at the same time. Unfortunately, these techniques have many limitations. Recently, trusted computing platforms (e.g., Intel SGX) have emerged as an alternative to implement encrypted databases. This paper demonstrates some vulnerabilities and the limitations of this technology, but it also shows how to make best use of it in order to improve on confidentiality, functionality, and performance.
Year
Venue
Field
2018
arXiv: Databases
Trusted Computing,Confidentiality,Computer science,Deterministic encryption,Encryption,Database,Cloud computing
DocType
Volume
Citations 
Journal
abs/1809.02631
0
PageRank 
References 
Authors
0.34
15
8
Name
Order
Citations
PageRank
Panagiotis Antonopoulos162.81
Arvind Arasu22475141.59
Ken Eguro319515.97
Joachim Hammer4536.64
Raghav Kaushik5141266.84
Donald Kossmann66220603.55
Ravi Ramamurthy711010.58
Jakub Szymaszek841.43