Privacy by Encrypted Databases

3Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There are a few reliable privacy mechanisms for cloud applications. Data usually needs to be decrypted in order to be processed by the cloud service provider. In this paper we explore how an encrypted database can (technically) ensure privacy. We study the use case of a mobile personalized healthcare app. We show that an encrypted database can ensure data protection against a cloud service provider. Furthermore we show that if privacy is considered in application design, higher protection levels can be achieved, although encrypted database are a transparent privacy and security mechanism. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Grofig, P., Hang, I., Härterich, M., Kerschbaum, F., Kohler, M., Schaad, A., … Tighzert, W. (2014). Privacy by Encrypted Databases. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8450 LNCS, pp. 56–69). Springer Verlag. https://doi.org/10.1007/978-3-319-06749-0_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free