Breaking and Building Encrypted Databases
dc.contributor.author | Grubbs, Paul Allen | |
dc.contributor.chair | Ristenpart, Thomas | |
dc.contributor.committeeMember | Zabih, Ramin | |
dc.contributor.committeeMember | Shmatikov, Vitaly | |
dc.date.accessioned | 2021-03-12T17:38:21Z | |
dc.date.available | 2021-03-12T17:38:21Z | |
dc.date.issued | 2020-08 | |
dc.description | 139 pages | |
dc.description.abstract | The subject of this thesis is encrypted databases: systems that use novel cryptographic techniques to store and efficiently query encrypted data. Motivated by the increasing frequency and severity of harmful data breaches, encrypted databases keep data encrypted at all times, ensuring that it is unavailable even to an attacker that compromises the database system’s security. To keep queries efficient, encrypted databases must leak some information about the underlying plaintext data and queries. The leakage and its impact on security differs depending on the way the system is compromised. In this thesis, I investigate the performance-security tradeoffs made by encrypted databases. First, I study current encrypted databases to understand the leakage that would be available to an attacker in likely compromise scenarios. I conclude that many of the security claims made of encrypted databases are incorrect. Then, I examine the security impact of a concrete leakage shared by most encrypted databases. In the process I develop new technical tools based on statistical learning theory. Finally, informed by an understanding of existing databases, I propose a novel performance-security tradeoff for encrypted key-value stores. I instantiate that new tradeoff with frequency smoothing, analyze it using new theory, and build a system. | |
dc.identifier.doi | https://doi.org/10.7298/1tvp-fr92 | |
dc.identifier.other | Grubbs_cornellgrad_0058F_12252 | |
dc.identifier.other | http://dissertations.umi.com/cornellgrad:12252 | |
dc.identifier.uri | https://hdl.handle.net/1813/102884 | |
dc.language.iso | en | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.subject | applied cryptography | |
dc.subject | computer security | |
dc.subject | cryptography | |
dc.subject | databases | |
dc.subject | encryption | |
dc.title | Breaking and Building Encrypted Databases | |
dc.type | dissertation or thesis | |
dcterms.license | https://hdl.handle.net/1813/59810 | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | Cornell University | |
thesis.degree.level | Doctor of Philosophy | |
thesis.degree.name | Ph. D., Computer Science |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Grubbs_cornellgrad_0058F_12252.pdf
- Size:
- 1.5 MB
- Format:
- Adobe Portable Document Format