[aerogear-dev] Querying encrypted data
Apostolos Emmanouilidis
aemmanou at redhat.com
Tue Oct 15 04:51:22 EDT 2013
Solution #3 must be the most performance efficient one. However, my
sense is that in order to achieve good matching results, the metadata
would need to contain some keywords / keyphrases of the actual content
which is encrypted. This sounds like exposing important information as
unecrypted. Maybe a combination of #1 and #3 could be an option as well.
The metadata could be encrypted, loaded into memory, decrypted and
queried.
On Tue, 2013-10-15 at 10:17 +0200, Erik Jan de Wit wrote:
> Don't know how feasible it is, but we could query the encrypted data without decrypting. We still have tables, columns and rows and with encrypted names and values. Then we could parse the sql statement and encrypt the names and values in it and then run it against the database. The returned result is then the only thing that needs to be decrypted. How does that sound? This approach will obviously give away that data in certain columns is the same, and maybe there is more downsides to this that I don't see.
>
> Cheers,
> Erik Jan
>
> On 14 Oct,2013, at 21:47 , Summers Pittman <supittma at redhat.com> wrote:
>
> > One of the things that came up while discussing offline secure storage
> > on Android was how to query encrypted data.
> >
> > The first ideas that I could think of were:
> >
> > 1) Load encrypted files/data/databases into memory, decrypt them, query
> > them, return results and GC the decrypted data.
> >
> > 2) magical phonetic encryption
> >
> > 3) Include queryable decrypted metadata along with encrypted payloads.
> > The payloads will not be queryable and only be decrypted if metadata
> > matches the query.
> >
> > #1 has some benefits (easy to implement across platforms, doesn't
> > require a lot of work) and some draw backs (large datasets would eat
> > into available memory, whole dataset would be vulnerable to a VM attack).
> >
> > #2 is a placeholder for better ideas.
> >
> > #3 is interesting because it is a middle of the road approach. One of
> > the options for implementation I thought of would be to annotate fields
> > in the VO being stored as "privledged" and they would be the only ones
> > encrypted/decrypted when an object is stored or loaded.
> >
> > wdyt?
> > _______________________________________________
> > aerogear-dev mailing list
> > aerogear-dev at lists.jboss.org
> > https://lists.jboss.org/mailman/listinfo/aerogear-dev
>
>
> _______________________________________________
> aerogear-dev mailing list
> aerogear-dev at lists.jboss.org
> https://lists.jboss.org/mailman/listinfo/aerogear-dev
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/aerogear-dev/attachments/20131015/8479cfac/attachment-0001.html
More information about the aerogear-dev
mailing list