Advances, Systems and Applications
From: Confidential database-as-a-service approaches: taxonomy and survey
CPI approach | Satisfiable deployment requirements | CPI security properties | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Functionality | Prot. level | Attacker model | ||||||||||||||
Queries | Modification | Monitoring cap. | Knowledge | (Properties in brackets are only | ||||||||||||
ES | RS | LS | AG | Insert | Update | Delete | Data | Mod. | Quer. | NBK | BKS | BKD | BKQ | provided to a certain degree.) | ||
Deterministic Indexes | X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | Distinguishable ciphertexts | |||||
Deterministic Indexes (Flattened) [10] | X | X | X | X | P | ✓ | ✓ | ✓ | ✓ | ✓ | (Indistinguishable ciphertexts) | |||||
X | X | X | X | C | ✓ | ✓ | ✓ | Distinguishable ciphertexts | ||||||||
X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ||||||||
X | X | C | ✓ | ✓ | ✓ | ✓ | ||||||||||
X | X | X | X | P | ✓ | ✓ | ✓ | ✓ | ✓ | (Indistinguishable ciphertexts) | ||||||
X | X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | Order-preserving ciphertexts | ||||||
X | X | X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | ||||
X | X | X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ||||||
X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||
X | X | xa | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | ||||
X | X | xa | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ||||||
X | X | xa | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
Encrypted B-Trees (Shuffled) [24] | X | X | xa | X | X | X | P | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | |
(Access & pattern confidentiality) | ||||||||||||||||
Fragmentation [25] | X | X | X | X | X | X | X | P | ✓ | ✓ | ✓ | ✓ | ✓ | (Indistinguishable ciphertexts) | ||
X | X | X | X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | ||
Access confidentiality | ||||||||||||||||
X | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | ||||
Access & pattern confidentiality | ||||||||||||||||
X | X | xa | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | ||
Oblivious RAM (Non-colluding SPs) [36] | X | X | xa | X | X | X | C | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Access & pattern confidentiality | |
X | X | xa | C | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Indistinguishable ciphertexts | |||||
Private Information Retrieval (Non-colluding SPs) [37,43,44] | X | X | xa | C | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Access & pattern confidentiality |