Figure 2From: Confidential database-as-a-service approaches: taxonomy and survey Attacker taxonomy. Back to article page