Czasopismo
Tytuł artykułu
Warianty tytułu
Języki publikacji
Abstrakty
In this article we describe two alternative order-preserving encryption schemes. First scheme is based on arithmetic coding and the second scheme uses sequence of matrices for data encrypting. In the beginning of this paper we briefly describe previous related work published in recent time. Then we propose alternative variants of OPE and consider them in details. We examine drawbacks of these schemes and suggest possible ways of their improvement. Finally we present statistical results of implemented prototypes and discuss further work.(original abstract)
Rocznik
Tom
Strony
891-899
Opis fizyczny
Twórcy
autor
- Novosibirsk State University
autor
- Novosibirsk State University
autor
- Novosibirsk State University
Bibliografia
- Agrawal R., Kiernan J., Stikant R., and Xu Y., Order-preserving encryption for numeric data, ACM SIGMOD International Conference on Management of Data, pp. 563-574, 2004.
- Amanatidis G., Boldyreva A., and O'Neill A., Provably-secure schemes for basic query support in outsourced databases, Working Conference on Data and Applications Security, pp. 14-30, 2007.
- Bebek G. Anti-tamper database research: Inference control techniques, Technical Report EECS 433 Final Report, Case Western Reserve University, 2002.
- Boldyreva A., Chenette N., and O'Neill A., Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions, Crypto11, 2011.
- Boldyreva A., Chenette N., Lee Y., and O'Neill A., Order-preserving symmetric encryption, Eurocrypt, pp. 224-241, 2009.
- Boneh D. and Waters B., Conjunctive, subset, and range queries on encrypted data, TCC, 535-554, 2007.
- Gultekin Ozsoyoglu, David A. Singer, and Sun S. Chung. Anti-Tamper Databases: Querying Encrypted Databases. In 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, 2003, http://dx.doi.org/10.1109/ICDEW.2006.30
- Hacigumus H., Iyer B. R., Li C., and Mehrotra S., Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD Conference on Management of Data, 2002.
- Halloush M. and Sharif M., Global heuristic search on encrypted data (GHSED), International Journal of Computer Science Issues (IJCSI), 1:13-17, 2009.
- Popa R. A., Li F. H., Zeldovich N., An Ideal-Security Protocol for Order-Preserving Encoding. IEEE Symposium on Security and Privacy 2013, http://dx.doi.org/10.1109/CISS.2012.6310814
- Schneier B., Wiley J.: Applied Cryptography Second Edition 1996 ISBN 0-471-11709-9.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171335485