SQL queries over encrypted databases: a survey

被引:1
|
作者
Sun, Bo [1 ]
Zhao, Sen [2 ]
Tian, Guohua [2 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
关键词
SQL queries; encrypted databases; evaluation model; PUBLICLY VERIFIABLE DATABASES; COMPUTATION;
D O I
10.1080/09540091.2024.2323059
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Limited by the local storage resource, data users have to encrypt their data and outsource the encrypted databases to cloud servers to enjoy low-cost, professional data management services, which promotes the rapid development of outsourcing database technology. Despite this, the complex underlying setting and loosely coupled database architecture lead to various security risks and performance bottlenecks, while there is currently no work to achieve a comprehensive evaluation of existing encrypted database solutions from the aspects of underlying settings, security levels, functions, etc. In this work, we first propose an evaluation model to assess SQL functionalities and security from multiple dimensions. Secondly, we categorise the existing SQL query schemes into three categories: software-based construction, hardware-based construction, and hybrid-based construction, that is, a combination of software and hardware components. On this basis, we analyse the framework, advantages, and limitations of classic and state-of-the-art schemes. Finally, we summarise the software-based and hardware-based approaches from dimensions of SQL functionality, security, and efficiency, thus clarifying their ideal application scenarios. Notably, SQL query schemes that exhibit minimal equality of pair leakage and support strong obliviousness can achieve higher levels of security. In addition, hardware-based solutions can achieve more complex SQL queries and superior performance without designing complex and functionally-limited cryptographic tools.
引用
收藏
页数:33
相关论文
共 50 条
  • [21] Fusion queries over Internet databases
    Yerneni, R
    Papakonstantinou, Y
    Abiteboul, S
    Garcia-Molina, E
    [J]. ADVANCES IN DATABASE TECHNOLOGY - EDBT'98, 1998, 1377 : 57 - 71
  • [22] Fast Multi-dimensional Range Queries on Encrypted Cloud Databases
    Chi, Jialin
    Hong, Cheng
    Zhang, Min
    Zhang, Zhenfeng
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I, 2017, 10177 : 559 - 575
  • [23] Completeness of Queries over Incomplete Databases
    Razniewski, Simon
    Nutt, Werner
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2011, 4 (11): : 749 - 760
  • [24] Secure Count Queries on Encrypted Genomic Data: A Survey
    Hasan, Zahidul
    Mahdi, Md Safiur Rahman
    Mohammed, Noman
    [J]. IEEE INTERNET COMPUTING, 2018, 22 (02) : 71 - 82
  • [25] SQL, NewSQL, and NOSQL Databases: A Comparative Survey
    Khasawneh, Tariq N.
    AL-Sahlee, Mahmoud H.
    Safia, Ali A.
    [J]. 2020 11TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2020, : 013 - 021
  • [26] Implementation of Projected Clustering based on SQL queries and UDFs in Relational Databases
    Harikumar, Sandhya
    Haripriya, H.
    Kaimal, M. R.
    [J]. 2013 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2013, : 7 - 12
  • [27] A secure Algorithm for Executing Queries over Encrypted Data
    Refaie, Rasha
    Ahmed, Abd El-Aziz
    Hamza, Nermin
    Al-Monem, Mahmood
    Helny, Hesham
    [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [28] eSkyline: Processing Skyline Queries over Encrypted Data
    Bothe, Suvarna
    Karras, Panagiotis
    Vlachou, Akrivi
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (12): : 1338 - 1341
  • [29] A New Scheme for Range Queries over Encrypted Data
    Bu, Shanyue
    Zhang, Yue
    Yu, Kun
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (11) : 2656 - 2660
  • [30] A novel method for designing indexes to support efficient substring queries on encrypted databases
    Hoang, Canh Ngoc
    Nguyen, Minh Hieu
    Nguyen, Thuy Thu Thi
    Vu, Huy Quang
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (03) : 20 - 36