dc.contributor.author | Popa, Raluca Ada | |
dc.contributor.author | Redfield, Catherine M. | |
dc.contributor.author | Zeldovich, Nickolai | |
dc.contributor.author | Balakrishnan, Hari | |
dc.date.accessioned | 2012-10-18T19:27:54Z | |
dc.date.available | 2012-10-18T19:27:54Z | |
dc.date.issued | 2011-10 | |
dc.identifier.isbn | 978-1-4503-0977-6 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/74107 | |
dc.description.abstract | Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. CryptDB is a system that provides practical and provable confidentiality in the face of these attacks for applications backed by SQL databases. It works by executing SQL queries over encrypted data using a collection of efficient SQL-aware encryption schemes. CryptDB can also chain encryption keys to user passwords, so that a data item can be decrypted only by using the password of one of the users with access to that data. As a result, a database administrator never gets access to decrypted data, and even if all servers are compromised, an adversary cannot decrypt the data of any user who is not logged in. An analysis of a trace of 126 million SQL queries from a production MySQL server shows that CryptDB can support operations over encrypted data for 99.5% of the 128,840 columns seen in the trace. Our evaluation shows that CryptDB has low overhead, reducing throughput by 14.5% for phpBB, a web forum application, and by 26% for queries from TPC-C, compared to unmodified MySQL. Chaining encryption keys to user passwords requires 11--13 unique schema annotations to secure more than 20 sensitive fields and 2--7 lines of source code changes for three multi-user web applications. | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (CNS-0716273) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (IIS-1065219) | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/2043556.2043566 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | CryptDB: Protecting confidentiality with encrypted query processing | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Popa, Raluca Ada et al. “CryptDB: Protecting confidentiality with encrypted query processing.” ACM Press, 2011. 85. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Popa, Raluca Ada | |
dc.contributor.mitauthor | Redfield, Catherine M. | |
dc.contributor.mitauthor | Zeldovich, Nickolai | |
dc.contributor.mitauthor | Balakrishnan, Hari | |
dc.relation.journal | Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP '11) | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Popa, Raluca Ada; Redfield, Catherine M. S.; Zeldovich, Nickolai; Balakrishnan, Hari | en |
dc.identifier.orcid | https://orcid.org/0000-0003-0238-2703 | |
dc.identifier.orcid | https://orcid.org/0000-0002-1455-9652 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |