Implementation of a Storage Mechanism for Untrusted DBMSs

E. Damiani, S. De Capitani Di Vimercati, M. Finetti, S. Paraboschi, P. Samarati, S. Jajodia

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

32 Scopus citations

Abstract

Several architectures have been recently proposed that store relational data in encrypted form on untrusted relational databases. Such architectures permit the creation of novel Internet services and also offer an opportunity for a better construction of ASP solutions. Environments where there are limited resources that do not permit an efficient management of databases or where it is critical to offer a robust Internet access to private data may all benefit from the above architectures. In this paper we analyze the impact that this architecture has on the typical services of a database. The analysis is based on the experience gained in the construction of a prototype of a complete architecture for the management of encrypted databases. Specifically, we illustrate the impact on query translation and optimization, and the main components of the software architecture of the prototype.

Original languageBritish English
Title of host publication2nd IEEE International Security in Storage Workshop, SISW 2003
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages38-46
Number of pages9
ISBN (Electronic)0769520596, 9780769520599
DOIs
StatePublished - 2004
Event2nd IEEE International Security in Storage Workshop, SISW 2003 - Washington, United States
Duration: 31 Oct 2003 → …

Publication series

Name2nd IEEE International Security in Storage Workshop, SISW 2003

Conference

Conference2nd IEEE International Security in Storage Workshop, SISW 2003
Country/TerritoryUnited States
CityWashington
Period31/10/03 → …

Keywords

  • Application specific processors
  • Computer architecture
  • Cryptography
  • Data analysis
  • Environmental management
  • Relational databases
  • Resource management
  • Robustness
  • Software prototyping
  • Web and internet services

Fingerprint

Dive into the research topics of 'Implementation of a Storage Mechanism for Untrusted DBMSs'. Together they form a unique fingerprint.

Cite this