ANALYZING CLIENT-SIDE ENCRYPTION IMPLEMENTED IN CRYPTDB

Mira Maisura

Abstract


Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption. It allows users to protect their data and prohibit access to that data from unauthorized user. Here, key use for encryption and decryption are all belong and known only to the user. On the other words, data stored in the database are all in encrypted form. CryptDB, a new cryptographic technique, where the system acts as a proxy to protect the communication between the application server and database server, implementing the idea. The aim of this study is to look into more detail about the encryption scheme implemented in CryptDB in 2 different case study, using SEARCH command with the condition given. The result of the study will present how the statement change with the act of proxy, and the encryption scheme implemented here.

Keywords


security, database, cryptography

Full Text:

PDF

References


R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB : Protecting confidentiality with encrypted query processing. In Proc. of the 3rd SOSP, pages 85-100, Cascais, Portugal, Oct 2011

M. G. Solomon, V. Sunderam, L. Xiong , Towards Secure Cloud Database with fine-grained access control Book of Data and Application Security and Privacy, pages 324-338 , Springer berlin Heidelberg, 2014

R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB : A practical encrypted relational DBMS. In Proc. of 23rd ACM Symposium on Operating Systems Principles, pages 85-100, USA, 2011

S. Tu , M.F. Kaashoek, S. Madden, N. Zeldovich. Processing analytical queries over encrypted data. In Proc. of the VLDB Endowment Volume 6, pages 289-300, March 2013

R. A. Popa, F. H. li, N. Zeldovich . An ideal-security protocol for order-preserving encoding.

In Proc Sp'13 of the 2013 IEEE Symposium on Security and Privacy, pages 463-477, Washington, DC, USA, 2013

CryptDB https://css.csail.mit.edu/cryptdb/

S. Tu , M.F. Kaashoek, S. Madden, N. Zeldovich. Processing analytical queries over encrypted data. . In Proc. of the VLDB Endowment Volume 6, pages 289-300, March 2013

A. Boldyreva, N. Chenette, Y.Lee, A. O'Neil. Order-Preserving Symmetric Encryption.

In Proc of the 28th Annual International Conference on Advances in Cryptology : The Theory and Applications of Cryptographic Techniques, pages 224-241, Berlin, Heidelberg, 2009

CryptDB source Code, available at https://github.com/CryptDB/cryptdb

D. X. Song, D. Wagner, A. Perrig. Practical Techniques for Search on Encrypted Data.

In Proc of the 2000 IEEE Symposium on Security and Privacy, page 44, USA, 2000




DOI: http://dx.doi.org/10.22373/cs.v2i1.2852

Refbacks

  • There are currently no refbacks.


Copyright (c) 2018 Mira Maisura

This journal has been indexed by:

Cyberspace: Jurnal Pendidikan Teknologi Informasi
Published by Center for Research and Community Service (LP2M) in cooperation with the Department of Information Technology Education, Faculty of Education and Teacher Training, Ar-Raniry State Islamic University, Banda Aceh.
P-ISSN: 2598-2079
E-ISSN: 2597-9671
Creative Commons License
Content on this site is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License,
except where otherwise noted.