Cipherbase - Encrypted SQL
Cipherbase - Encrypted SQL
Written by Kay Ewbank   
Tuesday, 22 January 2013

Microsoft Research is working on a SQL database system for storing and processing strongly encrypted data. The Cipherbase system is based on a combination of customized trusted hardware and Microsoft SQL Server.

A paper on the design of the Cipherbase secure hardware has been presented at the Sixth Biennial Conference on Innovative Data Systems Research. The problem the researchers are trying to solve is how a DBMS offered as a cloud service could query encrypted data, with the aim of creating a system that offers the full functionality of a DBMS in the server, independent of how the data is encrypted. In other words, application logic should be decoupled from encryption.

Clients declare what columns to encrypt and how, and the system is functional with no changes to app code, no matter how complex the code is. The researchers call this property orthogonality between encryption and function or orthogonal security for short.

The paper given at the conference says that orthogonal security allows organizations to develop their applications and set their data security goals relatively independently of any performance, scalability, or cost considerations. To achieve this, the team’s goals are that Cipherbase should be a complete SQL system, so new apps can make use of the whole of SQL and legacy apps needn’t be rewritten. Users should be able to specify encryption and end-to-end security for their data at a column granularity, and Cipherbase should execute queries and transactions efficiently, while meeting the user’s confidentiality requirements for all data.

The idea behind the system is that apps don’t connect directly to the DBMS. They connect to an ODBC client extension and issue queries in the clear as usual. The client extension ships off an encrypted query or plan to the server which returns encrypted results that are decrypted and returned to the app. So at the client, there is no data and no query processing performed.

To achieve this, the team extends the server with a piece of trusted hardware (the Trusted Machine) that has access to the key. Since it has the key, it can decrypt data and perform any computation, ranging from simple predicates to more complex aggregates. The Trusted Machine type chosen by the researchers is FPGA (Field Programmable Gate Arrays), because of its combination of security and ability to handle data-intensive applications.

fpga

 

Cipherbase is still under active research and development at Microsoft Research.

 

MSR

 

Banner


Selfie Righteous - Corrects Selfie Perspective
03/08/2016

This is news that had to be covered, if only for the name of the new technique - Selfie Righteous is a name to contemplate.  The idea is simple enough, but are enough people aware that there is a [ ... ]



Intel's New Joule In The Crown
17/08/2016

I couldn't resist the headline, but the news is perfectly serious. IoT hardware is becoming more and more like a full desktop computer. Move over Arduino, the Intel Joule might well crush you with its [ ... ]


More News

Last Updated ( Tuesday, 22 January 2013 )
 
 

   
Banner
RSS feed of news items only
I Programmer News
Copyright © 2016 i-programmer.info. All Rights Reserved.
Joomla! is Free Software released under the GNU/GPL License.