StealthDB: a Scalable Encrypted Database with Full SQL Query Support

11/07/2017
by   Alexey Gribov, et al.
0

Encrypted database systems provide a great method for protecting sensitive data in untrusted infrastructures. These systems are built using either special-purpose cryptographic algorithms that support operations over encrypted data, or by leveraging trusted computing co-processors. Strong cryptographic algorithms usually result in high performance overheads (e.g., public-key encryptions, garbled circuits), while weaker algorithms (e.g., order-preserving encryption) result in large leakage profiles. On the other hand, some encrypted database systems (e.g., Cipherbase, TrustedDB) leverage non-standard trusted computing devices, and are designed to work around their specific architectural limitations. In this work we build StealthDB -- an encrypted database system from Intel SGX. Our system can run on any newer generation Intel CPU. StealthDB has a very small trusted computing base, scales to large datasets, requires no DBMS changes, and provides strong security guarantees at steady state and during query execution.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/07/2018

Pushing the Limits of Encrypted Databases with Secure Hardware

Encrypted databases have been studied for more than 10 years and are qui...
research
02/12/2020

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves

Data confidentiality is an important requirement for clients when outsou...
research
08/10/2021

Secure k-Anonymization over Encrypted Databases

Data protection algorithms are becoming increasingly important to suppor...
research
12/20/2017

Intel SGX Enabled Key Manager Service with OpenStack Barbican

Protecting data in the cloud continues to gain in importance, with encry...
research
12/18/2019

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data

While the security of the cloud remains a concern, a common practice is ...
research
05/18/2022

Confidential Machine Learning within Graphcore IPUs

We present IPU Trusted Extensions (ITX), a set of experimental hardware ...
research
09/22/2021

Privacy-preserving Credit Scoring via Functional Encryption

The majority of financial organizations managing confidential data are a...

Please sign up or login with your details

Forgot password? Click here to reset