
Cryptography for Big Data Security
261
assumptions. Here, security stems from requiring the server to perform the sensitive portion of
their searches properly on a trusted hardware device thus guaranteeing security of the data and
correctness of the searches. Specifically, security is guaranteed as long as adversaries cannot
tamper with the internal state of the trusted hardware.
Bajaj and Sion use this approach to build a full relational database whose data structures
and query processing methods are split into secure pieces run in a trusted enclave and insecure
components that run on commodity hardware. To analyze the efficiency of this approach, ...