1. EnclaveDB: A Secure Database Using SGX 2018 EncryptedDatabases IntelSGX Oakland
    Christian Priebe, Kapil Vaswani and Manuel Costa
    [View PDF on ieeexplore.ieee.org]
    [Show BibTex Citation]

    @INPROCEEDINGS{8418608,
    author={C. {Priebe} and K. {Vaswani} and M. {Costa}},
    booktitle={2018 IEEE Symposium on Security and Privacy (SP)},
    title={EnclaveDB: A Secure Database Using SGX},
    year={2018},
    volume={},
    number={},
    pages={264-278},
    keywords={data integrity;meta data;query processing;trusted computing;EnclaveDB;secure database;database administrator;in-memory storage;query engine;database log;in-memory database engine;Databases;Servers;Engines;Encryption;Protocols;database;security;enclave;integrity;in memory;sgx},
    doi={10.1109/SP.2018.00025},
    ISSN={2375-1207},
    month={May},
    }

We propose EnclaveDB, a database engine that guarantees confidentiality, integrity, and freshness for data and queries. EnclaveDB guarantees these properties even when the database administrator is malicious, when an attacker has compromised the operating system or the hypervisor, and when the database runs in an untrusted host in the cloud. EnclaveDB achieves this by placing sensitive data (tables, indexes and other metadata) in enclaves protected by trusted hardware (such as Intel SGX). EnclaveDB has a small trusted computing base, which includes an in-memory storage and query engine, a transaction manager and pre-compiled stored procedures. A key component of EnclaveDB is an efficient protocol for checking integrity and freshness of the database log. The protocol supports concurrent, asynchronous appends and truncation, and requires minimal synchronization between threads. Our experiments using standard database benchmarks and a performance model that simulates large enclaves show that EnclaveDB achieves strong security with low overhead (up to 40% for TPC-C) compared to an industry strength in-memory database engine.

  1.