Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2011-02-15
2011-02-15
Lanier, Benjamin E (Department: 2432)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
Reexamination Certificate
active
07890774
ABSTRACT:
A system, method, computer program product, and data management service that allows any comparison operation to be applied on encrypted data, without first decrypting the operands. The encryption scheme of the invention allows equality and range queries as well as the aggregation operations of MAX, MIN, and COUNT. The GROUPBY and ORDERBY operations can also be directly applied. Query results produced using the invention are sound and complete, the invention is robust against cryptanalysis, and its security strictly relies on the choice of a private key. Order-preserving encryption allows standard database indexes to be built over encrypted tables. The invention can easily be integrated with existing systems.
REFERENCES:
patent: 5848404 (1998-12-01), Hafmer et al.
patent: 5963642 (1999-10-01), Goldstein
patent: 6148342 (2000-11-01), Ho
patent: 6269359 (2001-07-01), Sekine
patent: 6983365 (2006-01-01), Douceur et al.
patent: 7395437 (2008-07-01), Agrawal et al.
patent: 2002/0076044 (2002-06-01), Pires
patent: 2002/0104002 (2002-08-01), Nishizawa et al.
patent: 2002/0129260 (2002-09-01), Benfield et al.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In 28th Int=l. Conference on Very Large Databases, Hong Kong, China, Aug. 2002.
N. Ahituv, Y. Lapid, and S. Neumann. Processing encrypted data. Communications of the ACM, 30(9):777-780, 1987.
L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In Proc. of the VLDB Conference, p. 131-142, Hong Kong, China, Aug. 2002.
C. Boyens and O. Gunther. Trust is not enough: Privacy and security in ASP and web service environments. In 6th East-European Conference on Advances in Databases and Information Systems, Bratislava, Slovakia, Sep. 2002.
D. Comer. The ubiquitous B-tree. ACM Computing Surveys, 11(2):121-138, Jun. 1979.
D. Denning. Cryptography and Data Security. Addison-Wesley, 1982.
J. Domingo-Ferror and J. Herrera-Joancomarti. A privacy homomorphism allowing field operations on encrypted data, 1998.
J. Domingo-Ferror. A new privacy homomorphism and applications. Information Processing Letters, 60(5):277-282, 1996.
J. Feigenbaum, M.Y. Liberman, and R.N. Wright. Cryptographic protection of databases and software. In Proc. of the DIMACS Workshop on Distributed Computing and Cryptography, 1990.
E.A. Fox, Q.F. Chen, A.M. Daoud, and L.S. Heath. Order-preserving minimal perfect hash functions and information retrieval. ACM Transactions on Information Systems (TOIS), 9:281-308, 1991.
H. Hacigumus, B.R. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD Conf. on Management of Data, Madison, Wisconsin, Jun. 2002.
H. Hacigumus, B.R. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the Int=l. Conf. on Data Engineering, San Jose, California, Mar. 2002.
A. Kerckhoffs. Le cryptographie militaire. Journal des Sciences Militaires, 9:5-38, Jan. 1883.
National Institute of Standards and Technology, U.S. Department of Commerce. Digital Signature Standard, May 1994.
Oracle Corporation. Database Encryption in Oracle 8i, Aug. 2000.
R. Rivest. The MD5 message digest algorithm. RFC 1320, Apr. 1992.
R.L. Rivest, L. Adelman, and M.L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, p. 169-178, 1978.
B. Schneier. Applied Cryptography. John Wiley, second edition, 1996.
D.X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Symp. on Security and Privacy, Oakland, California, 2000.
R. Vingralek. Gnatdb: A small-footprint, secure database system. In Proc. of the VLDB Conference, p. 884-893, Hong Kong, China, Aug. 2002.
Agrawal Rakesh
Kiernan Gerald George
Fleit Gibbons Gutman Bongini & Bianco PL
Gibbons Jon A.
International Business Machines - Corporation
Lanier Benjamin E
Zecher Cordelia
LandOfFree
System and method for fast querying of encrypted databases does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for fast querying of encrypted databases, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for fast querying of encrypted databases will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2640705