Encrypted Database Design: Specialized Approaches

This paper presents two specialized approaches to the design of a database incorporating cryptography in a fundamental way. Most processing is carried out on the encrypted version of the database at an insecure central site. Query initiation and final query interpretation occur at a secure local workstation. The first approach implements a text file with searches based on keywords. The second approach uses subfields and homophonic representations to create a secure database with fairly broad capabilities.

[1]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[2]  Dorothy E. Denning Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.

[3]  Catherine A. Meadows,et al.  A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data , 1985, 1985 IEEE Symposium on Security and Privacy.

[4]  Richard D. Graubart,et al.  The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.

[5]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[6]  Dorothy E. Denning,et al.  Commutative Filters for Reducing Inference Threats in Multilevel Database Systems , 1985, 1985 IEEE Symposium on Security and Privacy.

[7]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[8]  Yi-Shiung Yeh,et al.  Cryptographic Relational Algebra , 1982, 1982 IEEE Symposium on Security and Privacy.

[9]  David L. Wells,et al.  Modified Architecture for the Sub-Keys Model , 1983, 1983 IEEE Symposium on Security and Privacy.

[10]  Dorothy E. Denning,et al.  Field Encryption and Authentication , 1983, CRYPTO.

[11]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[12]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[13]  M. E. Maron,et al.  An evaluation of retrieval effectiveness for a full-text document-retrieval system , 1985, CACM.