Toward Fully Functional Encrypted Databases

Kui Ren,Cong Wang
DOI: https://doi.org/10.1007/978-3-031-21377-9_6
IF: 2.701
2023-01-01
Wireless Networks
Abstract:After acquiring sufficient knowledge about searchable encryption, we are now able to delve into the world of fully functional encrypted databases. First of all, as a real-world application, there are many other dimensions beyond the key functionality “search” that we have to pay attention to. For instance, how to support concurrent queries (i.e., handling multiple queries at the same time), how to deal with the failure caused by various accidental reasons (e.g., power interruptions, unstable network, I/O failures), and how to enforce constraints to guarantee data comply with certain rules, etc.
What problem does this paper attempt to address?