Skip to main content

Advances, Systems and Applications

Table 2 Running example – outsourced data

From: Confidential database-as-a-service approaches: taxonomy and survey

ID

Name

Rating

Gender

Salary

 

ID

Age

α

Adam

345

η

ι

 

π

23

β

Bob

452

η

κ

 

ρ

25

γ

Carol

632

θ

λ

 

σ

25

δ

Dan

742

η

μ

 

τ

30

ε

Eve

893

θ

ν

 

υ

30

ζ

Adam

897

η

ξ

 

ϕ

30

  1. Rating: order-preserving ciphertexts.
  2. Gender: distinguishable ciphertexts.
  3. Salary and ID: indistinguishable ciphertexts.