Processing Over Encrypted Data: Between Theory and Practice

Data encryption is a common approach to protect the confidentiality of users' data. However, when computation is required, the data must be decrypted before processing. The decryption-for-processing approach causes critical threats. For instance, a compromised server may lead to the leakage of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:SIGMOD record 2016-09, Vol.45 (3), p.5-16
Hauptverfasser: Saleh, Eyad, Alsa'deh, Ahmad, Kayed, Ahmad, Meinel, Christoph
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 16
container_issue 3
container_start_page 5
container_title SIGMOD record
container_volume 45
creator Saleh, Eyad
Alsa'deh, Ahmad
Kayed, Ahmad
Meinel, Christoph
description Data encryption is a common approach to protect the confidentiality of users' data. However, when computation is required, the data must be decrypted before processing. The decryption-for-processing approach causes critical threats. For instance, a compromised server may lead to the leakage of data or cryptographic keys. On the other hand, data owners are concerned since the data is beyond their control. Thus, they look for mechanisms to achieve strong data protection. Accordingly, alternatives for protecting data become essential. Consequently, the trend of processing over encrypted data starts to arise along with a rapidly growing literature. This paper surveys applications, tools, building blocks, and approaches that can be used to directly process encrypted data (i.e., without decrypting it). The purpose of this survey is to provide an overview of existing systems and approaches that can be used to process encrypted data, discuss commercial usage of such systems, and to analyze the current developments in this area
doi_str_mv 10.1145/3022860.3022862
format Article
fullrecord <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3022860_3022862</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_3022860_3022862</sourcerecordid><originalsourceid>FETCH-LOGICAL-c195t-f3a1c622cd5e2a28e58606117d6842fa8e4dd8b5e6e4a553077c565f27b2f7223</originalsourceid><addsrcrecordid>eNotz01LAzEQxvEcFKzVszfZL7DtzGQnSY9Sqy0s1EN7XtJkIhX7QrII_fYq3dPv9jz8lXpCmCA2PNVA5AxMrtKNGgEaXbMDd6fuS_kCQIcGRur5I5-ClLI_flbrH8nV4hjy5dxLrF597x_UbfLfRR4Hx2r7ttjMl3W7fl_NX9o64Iz7OmmPwRCFyEKenPDfu0G00biGknfSxOh2LEYaz6zB2sCGE9kdJUukx2p63Q35VEqW1J3z_uDzpUPo_pO6IWmQ9C-XOj45</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Processing Over Encrypted Data: Between Theory and Practice</title><source>ACM Digital Library Complete</source><creator>Saleh, Eyad ; Alsa'deh, Ahmad ; Kayed, Ahmad ; Meinel, Christoph</creator><creatorcontrib>Saleh, Eyad ; Alsa'deh, Ahmad ; Kayed, Ahmad ; Meinel, Christoph</creatorcontrib><description>Data encryption is a common approach to protect the confidentiality of users' data. However, when computation is required, the data must be decrypted before processing. The decryption-for-processing approach causes critical threats. For instance, a compromised server may lead to the leakage of data or cryptographic keys. On the other hand, data owners are concerned since the data is beyond their control. Thus, they look for mechanisms to achieve strong data protection. Accordingly, alternatives for protecting data become essential. Consequently, the trend of processing over encrypted data starts to arise along with a rapidly growing literature. This paper surveys applications, tools, building blocks, and approaches that can be used to directly process encrypted data (i.e., without decrypting it). The purpose of this survey is to provide an overview of existing systems and approaches that can be used to process encrypted data, discuss commercial usage of such systems, and to analyze the current developments in this area</description><identifier>ISSN: 0163-5808</identifier><identifier>DOI: 10.1145/3022860.3022862</identifier><language>eng</language><ispartof>SIGMOD record, 2016-09, Vol.45 (3), p.5-16</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c195t-f3a1c622cd5e2a28e58606117d6842fa8e4dd8b5e6e4a553077c565f27b2f7223</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><creatorcontrib>Saleh, Eyad</creatorcontrib><creatorcontrib>Alsa'deh, Ahmad</creatorcontrib><creatorcontrib>Kayed, Ahmad</creatorcontrib><creatorcontrib>Meinel, Christoph</creatorcontrib><title>Processing Over Encrypted Data: Between Theory and Practice</title><title>SIGMOD record</title><description>Data encryption is a common approach to protect the confidentiality of users' data. However, when computation is required, the data must be decrypted before processing. The decryption-for-processing approach causes critical threats. For instance, a compromised server may lead to the leakage of data or cryptographic keys. On the other hand, data owners are concerned since the data is beyond their control. Thus, they look for mechanisms to achieve strong data protection. Accordingly, alternatives for protecting data become essential. Consequently, the trend of processing over encrypted data starts to arise along with a rapidly growing literature. This paper surveys applications, tools, building blocks, and approaches that can be used to directly process encrypted data (i.e., without decrypting it). The purpose of this survey is to provide an overview of existing systems and approaches that can be used to process encrypted data, discuss commercial usage of such systems, and to analyze the current developments in this area</description><issn>0163-5808</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNotz01LAzEQxvEcFKzVszfZL7DtzGQnSY9Sqy0s1EN7XtJkIhX7QrII_fYq3dPv9jz8lXpCmCA2PNVA5AxMrtKNGgEaXbMDd6fuS_kCQIcGRur5I5-ClLI_flbrH8nV4hjy5dxLrF597x_UbfLfRR4Hx2r7ttjMl3W7fl_NX9o64Iz7OmmPwRCFyEKenPDfu0G00biGknfSxOh2LEYaz6zB2sCGE9kdJUukx2p63Q35VEqW1J3z_uDzpUPo_pO6IWmQ9C-XOj45</recordid><startdate>20160901</startdate><enddate>20160901</enddate><creator>Saleh, Eyad</creator><creator>Alsa'deh, Ahmad</creator><creator>Kayed, Ahmad</creator><creator>Meinel, Christoph</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20160901</creationdate><title>Processing Over Encrypted Data</title><author>Saleh, Eyad ; Alsa'deh, Ahmad ; Kayed, Ahmad ; Meinel, Christoph</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c195t-f3a1c622cd5e2a28e58606117d6842fa8e4dd8b5e6e4a553077c565f27b2f7223</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Saleh, Eyad</creatorcontrib><creatorcontrib>Alsa'deh, Ahmad</creatorcontrib><creatorcontrib>Kayed, Ahmad</creatorcontrib><creatorcontrib>Meinel, Christoph</creatorcontrib><collection>CrossRef</collection><jtitle>SIGMOD record</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Saleh, Eyad</au><au>Alsa'deh, Ahmad</au><au>Kayed, Ahmad</au><au>Meinel, Christoph</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Processing Over Encrypted Data: Between Theory and Practice</atitle><jtitle>SIGMOD record</jtitle><date>2016-09-01</date><risdate>2016</risdate><volume>45</volume><issue>3</issue><spage>5</spage><epage>16</epage><pages>5-16</pages><issn>0163-5808</issn><abstract>Data encryption is a common approach to protect the confidentiality of users' data. However, when computation is required, the data must be decrypted before processing. The decryption-for-processing approach causes critical threats. For instance, a compromised server may lead to the leakage of data or cryptographic keys. On the other hand, data owners are concerned since the data is beyond their control. Thus, they look for mechanisms to achieve strong data protection. Accordingly, alternatives for protecting data become essential. Consequently, the trend of processing over encrypted data starts to arise along with a rapidly growing literature. This paper surveys applications, tools, building blocks, and approaches that can be used to directly process encrypted data (i.e., without decrypting it). The purpose of this survey is to provide an overview of existing systems and approaches that can be used to process encrypted data, discuss commercial usage of such systems, and to analyze the current developments in this area</abstract><doi>10.1145/3022860.3022862</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0163-5808
ispartof SIGMOD record, 2016-09, Vol.45 (3), p.5-16
issn 0163-5808
language eng
recordid cdi_crossref_primary_10_1145_3022860_3022862
source ACM Digital Library Complete
title Processing Over Encrypted Data: Between Theory and Practice
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T23%3A33%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Processing%20Over%20Encrypted%20Data:%20Between%20Theory%20and%20Practice&rft.jtitle=SIGMOD%20record&rft.au=Saleh,%20Eyad&rft.date=2016-09-01&rft.volume=45&rft.issue=3&rft.spage=5&rft.epage=16&rft.pages=5-16&rft.issn=0163-5808&rft_id=info:doi/10.1145/3022860.3022862&rft_dat=%3Ccrossref%3E10_1145_3022860_3022862%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true