ETH, Departement of Computer Science, Systems Group
Doi
Abstract
This technical report explores a new technique called POP. POP addresses the need to encrypt databases in the cloud and to execute complex SQL queries on the encrypted data efficiently. POP can be configured to meet different attacker scenarios. We present security results for four such adversary models. Furthermore, we present the results of performance experiments conducted using the TPC-H benchmark and an off-the-shelf relational database system in order to study the performance overheads of POP