ObliviousDB: Practical and efficient searchable encryption with controllable leakage

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Searchable encryption allows users to execute encrypted queries over encrypted databases. Several encryption schemes have been proposed in the literature but they leak sensitive information that could lead to inference attacks. We propose ObliviousDB, a searchable encryption scheme for an outsourced database that limits information leakage. Moreover, our scheme allows users to execute SQL-like queries on encrypted data and efficiently supports multi-user access without requiring key sharing. We have implemented ObliviousDB and show its practical efficiency.

Cite

CITATION STYLE

APA

Cui, S., Asghar, M. R., Galbraith, S. D., & Russello, G. (2018). ObliviousDB: Practical and efficient searchable encryption with controllable leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10723 LNCS, pp. 189–205). Springer Verlag. https://doi.org/10.1007/978-3-319-75650-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free