A Structure Preserving Database Encryption Scheme

A new simple and efficient database encryption scheme is presented. The new scheme enables encrypting the entire content of the database without changing its structure. In addition, the scheme suggests how to convert the conventional database index to a secure index on the encrypted database so that the time complexity of all queries is maintained. No one with access to the encrypted database can learn anything about its content without having the encryption key.

[1]  Stéphane Bressan,et al.  Introduction to Database Systems , 2005 .

[2]  I. M. Yaglom,et al.  Geometric Transformations I , 1962 .

[3]  Jan Chomicki,et al.  Hippo: A System for Computing Consistent Answers to a Class of SQL Queries , 2004, EDBT.

[4]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[5]  Peter Bodorik,et al.  Sociotechnical architecture for online privacy , 2005, IEEE Security & Privacy Magazine.

[6]  Ralph Howard,et al.  Data encryption standard , 1987 .

[7]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[8]  R. Bayer,et al.  On the encipherment of search trees and random access files , 1975, SIGF.

[9]  Dorothy E. Denning,et al.  The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[10]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[11]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[12]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[13]  Christopher J. Merz,et al.  UCI Repository of Machine Learning Databases , 1996 .

[14]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[15]  Gene Tsudik,et al.  A Framework for Efficient Storage Security in RDBMS , 2004, EDBT.

[16]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[17]  Wei-Pang Yang,et al.  Multilevel Secure Database Encryption with Subkeys , 1997, Data Knowl. Eng..

[18]  Joydeep Ghosh,et al.  Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.

[19]  Bhavani M. Thuraisingham,et al.  Design of LDV: a multilevel secure relational database management system , 1990 .

[20]  Rathindra Sarathy,et al.  A General Additive Data Perturbation Method for Database Security , 1999 .

[21]  Wei-Pang Yang,et al.  A two-phase encryption scheme for enhancing database security , 1995, J. Syst. Softw..

[22]  Asuman Dogac,et al.  A Semantic based Privacy Framework for Web Services , 2003 .

[23]  William L. Maxwell,et al.  On the implementation of security measures in information systems , 1972, CACM.

[24]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .

[25]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[26]  Luc Bouganim,et al.  Chip-Secured Data Access: Confidential Data on Untrusted Servers , 2002, VLDB.

[27]  Wei-Pang Yang,et al.  A New Dynamic Access Control Scheme Based on Subject-Object List , 1994, Data Knowl. Eng..

[28]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[29]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[30]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[31]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[32]  H. J. Pels,et al.  An introduction to database systems, sixth edition , 1997 .

[33]  Lance J. Hoffman,et al.  Building Privacy into the Semantic Web: An Ontology Needed Now , 2002 .

[34]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[35]  Athman Bouguettaya,et al.  Privacy on the Web: Facts, Challenges, and Solutions , 2003, IEEE Secur. Priv..

[36]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.