A survey on querying encrypted XML documents for databases as a service

"Database as a service" paradigm has gained a lot of interest in recent years. This has raised questions about the security of data in the servers. Firms outsourcing their XML databases to untrusted parties started to look for new ways to securely store data and efficiently query them. In this paper, encrypted XML documents, their crypto index structures and query processing using these structures are investigated. A comparison of various algorithms in the literature is given.

[1]  Yin Yang,et al.  An Efficient Approach to Support Querying Secure Outsourced XML Information , 2006, CAiSE.

[2]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[3]  Gultekin Özsoyoglu,et al.  Anti-Tamper Databases: Querying Encrypted Databases , 2003, DBSec.

[4]  Laks V. S. Lakshmanan,et al.  Efficient secure query evaluation over encrypted XML databases , 2006, VLDB.

[5]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[6]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[7]  Wilfred Ng,et al.  XQzip: Querying Compressed XML Using Structural Indexing , 2004, EDBT.

[8]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[9]  Sharad Mehrotra,et al.  Querying Encrypted XML Documents , 2006, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06).

[10]  Michael Schrefl,et al.  SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[11]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[12]  Alexander V. Veidenbaum,et al.  Innovative Architecture for Future Generation High-Performance Processors and Systems , 2003, Innovative Architecture for Future Generation High-Performance Processors and Systems, 2003.

[13]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[14]  Jae-Gil Lee,et al.  Secure query processing against encrypted XML data using Query-Aware Decryption , 2006, Inf. Sci..

[15]  Gultekin Özsoyoglu,et al.  Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[16]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[17]  C. M. Sperberg-McQueen,et al.  Extensible markup language , 1997 .

[18]  Ling Feng,et al.  Efficient Processing of Secured XML Metadata , 2003, OTM Workshops.

[19]  Wenfei Fan,et al.  Vectorizing and querying large XML repositories , 2005, 21st International Conference on Data Engineering (ICDE'05).