A Survey on Property-Preserving Database Encryption Techniques in the Cloud

Johannes Koppenwallner,Erich Schikuta
2023-12-19
Abstract:Outsourcing a relational database to the cloud offers several benefits, including scalability, availability, and cost-effectiveness. However, there are concerns about the security and confidentiality of the outsourced data. A general approach here would be to encrypt the data with a standardized encryption algorithm and then store the data only encrypted in the cloud. The problem with this approach, however, is that with encryption, important properties of the data such as sorting, format or comparability, which are essential for the functioning of database queries, are lost. One solution to this problem is the use of encryption algorithms, which also preserve these properties in the encrypted data, thus enabling queries to encrypted data. These algorithms range from simple algorithms like Caesar encryption to secure algorithms like mOPE. The report at hand presents a survey on common encryption techniques used for storing data in relation Cloud database services. It presents the applied methods and identifies their characteristics.
Cryptography and Security,Databases
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? The paper "A Survey of Attribute - Preserving Database Encryption Technologies in the Cloud" aims to solve the contradiction between security and availability when outsourcing relational databases to the cloud. Specifically, the paper explores how to preserve important data attributes (such as sorting, format, or comparability) while ensuring data confidentiality, so that the encrypted data can still support the normal functions of database queries. #### Main problems: 1. **Data security and privacy**: - When enterprises outsource relational databases to the cloud, the data control right is transferred to the cloud service provider, which causes serious security and privacy problems. - If the standard encryption algorithm is directly used to encrypt data, although it can protect data from unauthorized access, it will destroy the structural characteristics of data, making the encrypted data unusable for normal database query operations. 2. **Availability of encrypted data**: - Standard encryption methods will lose some key attributes of data (such as sorting, format, or comparability), which are crucial for database queries. - Therefore, although encryption can improve security, it also makes data unavailable at the same time, because the encrypted data no longer meets the requirements of the original data model. #### Solutions: To address the above problems, the paper proposes the Property - Preserving Encryption (PPE) technology. This type of encryption algorithm can preserve certain specific attributes while encrypting data, thus ensuring that the encrypted data can still support database query operations to a certain extent. Specifically, the paper discusses several common attribute - preserving encryption techniques, including but not limited to: - **Format - Preserving Encryption (FPE)**: The encrypted data retains its original format. - **Order - Preserving Encryption (OPE)**: The encrypted data retains its original order. - **Homomorphic Encryption**: Allows certain types of calculations on encrypted data. Through these techniques, the availability of data can be preserved as much as possible while ensuring data security, thereby realizing a secure and efficient cloud database system. ### Summary The main objective of this paper is to explore and summarize the existing attribute - preserving encryption techniques to solve the contradiction between data security and availability when outsourcing relational databases in the cloud. Through these techniques, the security and privacy of data can be ensured without affecting the data query function.