If data is deployed on a server in an untrusted environment (e.g. the cloud), the data owner might be afraid of honest-but-curious database administrators or other personnel or external attackers who have access to the server. Our processing mechanism uses adjustable query-based encryption: The data is encrypted in so called onion encryption layers where the weakest encryption schemes are the innermost layers, which are then encrypted with other encryption schemes.
Links:
Security Primitive:
Data Confidentiality
Cloud:
Security Requirements Addressed:
Contact:
mathias.kohler@sap.com
License:
SAP propietary
Source Code: