System and method for fast querying of encrypted databases

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07890774

ABSTRACT:
A system, method, computer program product, and data management service that allows any comparison operation to be applied on encrypted data, without first decrypting the operands. The encryption scheme of the invention allows equality and range queries as well as the aggregation operations of MAX, MIN, and COUNT. The GROUPBY and ORDERBY operations can also be directly applied. Query results produced using the invention are sound and complete, the invention is robust against cryptanalysis, and its security strictly relies on the choice of a private key. Order-preserving encryption allows standard database indexes to be built over encrypted tables. The invention can easily be integrated with existing systems.

REFERENCES:
patent: 5848404 (1998-12-01), Hafmer et al.
patent: 5963642 (1999-10-01), Goldstein
patent: 6148342 (2000-11-01), Ho
patent: 6269359 (2001-07-01), Sekine
patent: 6983365 (2006-01-01), Douceur et al.
patent: 7395437 (2008-07-01), Agrawal et al.
patent: 2002/0076044 (2002-06-01), Pires
patent: 2002/0104002 (2002-08-01), Nishizawa et al.
patent: 2002/0129260 (2002-09-01), Benfield et al.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In 28th Int=l. Conference on Very Large Databases, Hong Kong, China, Aug. 2002.
N. Ahituv, Y. Lapid, and S. Neumann. Processing encrypted data. Communications of the ACM, 30(9):777-780, 1987.
L. Bouganim and P. Pucheral. Chip-secured data access: Confidential data on untrusted servers. In Proc. of the VLDB Conference, p. 131-142, Hong Kong, China, Aug. 2002.
C. Boyens and O. Gunther. Trust is not enough: Privacy and security in ASP and web service environments. In 6th East-European Conference on Advances in Databases and Information Systems, Bratislava, Slovakia, Sep. 2002.
D. Comer. The ubiquitous B-tree. ACM Computing Surveys, 11(2):121-138, Jun. 1979.
D. Denning. Cryptography and Data Security. Addison-Wesley, 1982.
J. Domingo-Ferror and J. Herrera-Joancomarti. A privacy homomorphism allowing field operations on encrypted data, 1998.
J. Domingo-Ferror. A new privacy homomorphism and applications. Information Processing Letters, 60(5):277-282, 1996.
J. Feigenbaum, M.Y. Liberman, and R.N. Wright. Cryptographic protection of databases and software. In Proc. of the DIMACS Workshop on Distributed Computing and Cryptography, 1990.
E.A. Fox, Q.F. Chen, A.M. Daoud, and L.S. Heath. Order-preserving minimal perfect hash functions and information retrieval. ACM Transactions on Information Systems (TOIS), 9:281-308, 1991.
H. Hacigumus, B.R. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD Conf. on Management of Data, Madison, Wisconsin, Jun. 2002.
H. Hacigumus, B.R. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the Int=l. Conf. on Data Engineering, San Jose, California, Mar. 2002.
A. Kerckhoffs. Le cryptographie militaire. Journal des Sciences Militaires, 9:5-38, Jan. 1883.
National Institute of Standards and Technology, U.S. Department of Commerce. Digital Signature Standard, May 1994.
Oracle Corporation. Database Encryption in Oracle 8i, Aug. 2000.
R. Rivest. The MD5 message digest algorithm. RFC 1320, Apr. 1992.
R.L. Rivest, L. Adelman, and M.L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, p. 169-178, 1978.
B. Schneier. Applied Cryptography. John Wiley, second edition, 1996.
D.X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE Symp. on Security and Privacy, Oakland, California, 2000.
R. Vingralek. Gnatdb: A small-footprint, secure database system. In Proc. of the VLDB Conference, p. 884-893, Hong Kong, China, Aug. 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for fast querying of encrypted databases does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for fast querying of encrypted databases, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for fast querying of encrypted databases will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2640705

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.