Skip to main content
Log in

On the deductive security of queries to confidential databases in cloud computing systems

Moscow University Computational Mathematics and Cybernetics Aims and scope Submit manuscript

Abstract

We study certain simple models of confidential databases in cloud computing systems. In the framework of these models we introduce a concept of deductive security for queries to such databases, find necessary and sufficient conditions of deductive security, and describe some classes of queries which satisfy these requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. C. Gentry, “Fully homomorphic encryption using ideal lattices”, in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (ACM, New York, 2009), P. 169–178.

    Google Scholar 

  2. M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully homomorphic encryption over the integers”, in Proceedings of the 29th International Conference “Advances in Cryptology—EUROCRYPT 2010” (Springer, Berlin, 2010), pp. 24–43.

    Google Scholar 

  3. Z. Brakerski and V. Vaikuntanathan, “Efficient fully homomorphic encryption from (standard) LWE”, in Proceedings of the 52nd Symposium on Foundations of Computer Science (IEEE Computing Society, Washington, 2011), pp. 97–106.

    Google Scholar 

  4. C. Gentry, A. Sahai, and B. Waters, “Homomorphic encryption from learning with errors: conceptuallysimpler, asymptotically-faster, attribute-based”, in Proceedings of the 32nd International Conference “Advances in Cryptology—EUROCRYPT 2013” (Springer, Berlin, 2013), pp. 75–92.

    Google Scholar 

  5. C. Gentry and S. Halevi, “Implementing Gentry’s fully-homomorphic encryption scheme”, in Proceedings of the 30th International Conference “Advances in Cryptology—EUROCRYPT 2011” (Springer, Berlin, 2011), pp. 129–148.

    Google Scholar 

  6. C. Gentry, S. Halevi, and N. Smart, “Fully homomorphic encryption with polylog overhead”, in Proceedings of the 31st International Conference “Advances in Cryptology—EUROCRYPT 2012” (Springer, Berlin, 2012), pp. 465–482.

    Google Scholar 

  7. A. Lopez-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption”, in Proceedings of the 44th Annual ACM Symposium on Theory of Computing (ACM, New York, 2012), pp. 1219–1234.

    Google Scholar 

  8. Y. Gahi, M. Guennoun, and K. El-Khatib, “A secure database system using homomorphic encryption schemes”, in Proceedings of the 3rd International Conference on Advances in Databases, Knowledge, and Data Applications (IARIA, Red Hook, 2011), pp. 54–58.

    Google Scholar 

  9. D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. J. Wu, “Private database queries using somewhat homomorphic encryption”, in Proceedings of ACNS (Springer, Berlin, 2013), pp. 129–148.

    Google Scholar 

  10. M. Van Dijk and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing”, in Proceedings of the 5th USENIX Conference on Hot Topics in Security (USENIX Association, Berkeley, 2010), pp. 1–8.

    Google Scholar 

  11. N. P. Varnovskiy, S. A. Martishin, M. V. Khrapchenko, and A.V. Shokurov, “Secure cloud computing based threshold homomorphic encryption,” Programming and Computer Software 41 (4), 215–218 (2015).

    Article  MathSciNet  Google Scholar 

  12. N. P. Varnovskiy, V. A. Zakharov, and A.V. Shokurov, “On the existence of provably secure cloud computing systems,” Moscow Univ. Comput. Math. and Cybern. 36 (2), 83–88 (2016).

    Article  MATH  Google Scholar 

  13. S. Barker, “Deductive database security”, Research Directions in Data and Applications Security. IFIP (Springer, New York, 2003), pp. 103–114.

    Chapter  Google Scholar 

  14. R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-based access control models,” IEEE Computer 29 (2), 38–47 (1996).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. P. Varnovsky.

Additional information

Original Russian Text © N.P. Varnovsky, V.A. Zakharov, A.V. Shokurov, 2017, published in Vestnik Moskovskogo Universiteta, Seriya 15: Vychislitel’naya Matematika i Kibernetika, 2017, No. 1, pp. 38–43.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varnovsky, N.P., Zakharov, V.A. & Shokurov, A.V. On the deductive security of queries to confidential databases in cloud computing systems. MoscowUniv.Comput.Math.Cybern. 41, 38–43 (2017). https://doi.org/10.3103/S0278641917010095

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0278641917010095

Keywords

Navigation