ACKNOWLEDGEMENT
This work was funded by the DFG under grant num-
ber WI 4086/2-1.
REFERENCES
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004).
Order preserving encryption for numeric data. In Pro-
ceedings of the 2004 ACM SIGMOD International
Conference on Management of Data, pages 563–574.
ACM.
Boldyreva, A., Chenette, N., Lee, Y., and O’Neill, A.
(2009). Order-preserving symmetric encryption. In
Advances in Cryptology-EUROCRYPT 2009, pages
224–241. Springer.
Boldyreva, A., Chenette, N., and O’Neill, A. (2011). Order-
preserving encryption revisited: Improved security
analysis and alternative solutions. In Advances in
Cryptology–CRYPTO 2011, pages 578–595. Springer.
Borthakur, D., Gray, J., Sarma, J. S., Muthukkaruppan,
K., Spiegelberg, N., Kuang, H., Ranganathan, K.,
Molkov, D., and Menon, A. (2011). Apache hadoop
goes realtime at facebook. In Proceedings of the SIG-
MOD International Conference on Management of
Data, pages 1071–1080. ACM.
Chang, F., Dean, J., Ghemawat, S., Hsieh, W. C., Wal-
lach, D. A., Burrows, M., Chandra, T., and Fikes, A.
(2008). Bigtable: A distributed storage system for
structured data. ACM Transactions on Computer Sys-
tems (TOCS), 26(2):4.
Chenette, N., Lewi, K., Weis, S. A., and Wu, D. J. (2015).
Practical order-revealing encryption with limited leak-
age.
Harrison, G. (2015). Database survey. In Next Generation
Databases, pages 217–228. Springer.
Kadhem, H., Amagasa, T., and Kitagawa, H. (2010).
Mv-opes: Multivalued-order preserving encryption
scheme: A novel scheme for encrypting integer value
to many different values. IEICE TRANSACTIONS on
Information and Systems, 93(9):2520–2533.
Kerschbaum, F. and Schr
¨
opfer, A. (2014). Optimal average-
complexity ideal-security order-preserving encryp-
tion. In Proceedings of the 2014 ACM SIGSAC Con-
ference on Computer and Communications Security,
pages 275–286. ACM.
Lakshman, A. and Malik, P. (2010). Cassandra: a decen-
tralized structured storage system. ACM SIGOPS Op-
erating Systems Review, 44(2):35–40.
Liu, D. and Wang, S. (2012). Programmable order-
preserving secure index for encrypted database query
in service cloud environments. In Cloud Computing
(CLOUD), 2012 IEEE 5th International Conference
on, pages 502–509. IEEE.
Liu, Z., Chen, X., Yang, J., Jia, C., and You, I. (2014). New
order preserving encryption model for outsourced
databases in cloud environments. Journal of Network
and Computer Applications.
Mavroforakis, C., Chenette, N., O’Neill, A., Kollios, G.,
and Canetti, R. (2015). Modular order-preserving en-
cryption, revisited. In Proceedings of the 2015 ACM
SIGMOD International Conference on Management
of Data, pages 763–777. ACM.
Naveed, M., Kamara, S., and Wright, C. V. (2015).
Inference attacks on property-preserving encrypted
databases. In Proceedings of the 22nd ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 644–655. ACM.
Okman, L., Gal-Oz, N., Gonen, Y., Gudes, E., and
Abramov, J. (2011). Security issues in nosql
databases. In Trust, Security and Privacy in Com-
puting and Communications, 2011 IEEE 10th Inter-
national Conference on, pages 541–547. IEEE.
Popa, R. A., Li, F. H., and Zeldovich, N. (2013). An ideal-
security protocol for order-preserving encoding. In
IEEE Symposium on Security and Privacy, pages 463–
477.
Popa, R. A., Redfield, C., Zeldovich, N., and Balakrish-
nan, H. (2011). Cryptdb: protecting confidentiality
with encrypted query processing. In Proceedings of
the 23rd ACM Symposium on Operating Systems Prin-
ciples, pages 85–100. ACM.
Roche, D., Apon, D., Choi, S. G., and Yerukhimov, A.
(2015). Pope: Partial order-preserving encoding.
Technical report, Cryptology ePrint Arch. 2015/1106.
Tu, S., Kaashoek, M. F., Madden, S., and Zeldovich, N.
(2013). Processing analytical queries over encrypted
data. In Proceedings of the VLDB Endowment, vol-
ume 6, pages 289–300. VLDB Endowment.
Waage, T., Jhajj, R. S., and Wiese, L. (2015). Searchable
encryption in apache cassandra. In Proceedings of the
8th Symposium on Foundations and Practice of Secu-
rity (FPS). Springer.
Wozniak, S., Rossberg, M., Grau, S., Alshawish, A., and
Schaefer, G. (2013). Beyond the ideal object: to-
wards disclosure-resilient order-preserving encryption
schemes. In Proceedings of the 2013 ACM workshop
on Cloud computing security, pages 89–100. ACM.
Practical Application of Order-preserving Encryption in Wide Column Stores
359