The role of cryptography in database security
- 13 June 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g. from hackers) and possibly also against users trying to obtain information beyond their privileges, for instance by some type of statistical inference. However, for many database applications such as health information systems there exist conflicting interests of the database owner and the users or organizations interacting with the database, and also between the users. Therefore the database cannot necessarily be assumed to be fully trusted.In this extended abstract we address the problem of defining and achieving security in a context where the database is not fully trusted, i.e., when the users must be protected against a potentially malicious database. Moreover, we address the problem of the secure aggregation of databases owned by mutually mistrusting organisations, for example by competing companies.Keywords
This publication has 5 references indexed in Scilit:
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Player Simulation and General Adversary Structures in Perfect Multiparty ComputationJournal of Cryptology, 2000
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987