{"id":"https://openalex.org/W2159915142","doi":"https://doi.org/10.1145/2043556.2043566","title":"CryptDB","display_name":"CryptDB","publication_year":2011,"publication_date":"2011-10-23","ids":{"openalex":"https://openalex.org/W2159915142","doi":"https://doi.org/10.1145/2043556.2043566","mag":"2159915142"},"language":"en","primary_location":{"id":"doi:10.1145/2043556.2043566","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2043556.2043566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/1721.1/74107","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015782472","display_name":"Raluca Ada Popa","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Raluca Ada Popa","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059505603","display_name":"Catherine M. S. Redfield","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Catherine M. S. Redfield","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082808262","display_name":"Nickolai Zeldovich","orcid":"https://orcid.org/0000-0003-0238-2703"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nickolai Zeldovich","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113516878","display_name":"Hari Balakrishnan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hari Balakrishnan","raw_affiliation_strings":["MIT CSAIL"],"affiliations":[{"raw_affiliation_string":"MIT CSAIL","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015782472"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":86.3988,"has_fulltext":false,"cited_by_count":1136,"citation_normalized_percentile":{"value":0.9995875,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"85","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8508617877960205},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7209699153900146},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.622859537601471},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.5894119739532471},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.509552001953125},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.44624680280685425},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.4141913056373596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39604127407073975},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26609164476394653}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8508617877960205},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7209699153900146},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.622859537601471},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.5894119739532471},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.509552001953125},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.44624680280685425},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.4141913056373596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39604127407073975},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26609164476394653}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2043556.2043566","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2043556.2043566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles","raw_type":"proceedings-article"},{"id":"pmh:oai:dspace.mit.edu:1721.1/74107","is_oa":true,"landing_page_url":"http://hdl.handle.net/1721.1/74107","pdf_url":null,"source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"MIT web domain","raw_type":"http://purl.org/eprint/type/ConferencePaper"}],"best_oa_location":{"id":"pmh:oai:dspace.mit.edu:1721.1/74107","is_oa":true,"landing_page_url":"http://hdl.handle.net/1721.1/74107","pdf_url":null,"source":{"id":"https://openalex.org/S4306400425","display_name":"DSpace@MIT (Massachusetts Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I63966007","host_organization_name":"Massachusetts Institute of Technology","host_organization_lineage":["https://openalex.org/I63966007"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"MIT web domain","raw_type":"http://purl.org/eprint/type/ConferencePaper"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7699999809265137}],"awards":[{"id":"https://openalex.org/G2156195316","display_name":null,"funder_award_id":"CNS-0716273 IIS-1065219","funder_id":"https://openalex.org/F4320337389","funder_display_name":"Division of Information and Intelligent Systems"},{"id":"https://openalex.org/G3454547468","display_name":"Collaborative Research: CT-T: Towards a More Accountable Internet","funder_award_id":"0716273","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G534155614","display_name":"III: Medium: Scalable and Secure Database as a Service","funder_award_id":"1065219","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7324827393","display_name":null,"funder_award_id":"CNS-0716273 IIS-1065219","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320337389","display_name":"Division of Information and Intelligent Systems","ror":"https://ror.org/053a2cp42"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W3168804","https://openalex.org/W15308973","https://openalex.org/W100863554","https://openalex.org/W1481785025","https://openalex.org/W1483091879","https://openalex.org/W1495057283","https://openalex.org/W1503242180","https://openalex.org/W1505465226","https://openalex.org/W1526102210","https://openalex.org/W1544010666","https://openalex.org/W1553146597","https://openalex.org/W1555820810","https://openalex.org/W1557386445","https://openalex.org/W1566967335","https://openalex.org/W1589843374","https://openalex.org/W1895952394","https://openalex.org/W2031533839","https://openalex.org/W2035871140","https://openalex.org/W2043226436","https://openalex.org/W2043508455","https://openalex.org/W2086838666","https://openalex.org/W2089877558","https://openalex.org/W2109426455","https://openalex.org/W2112460803","https://openalex.org/W2114349788","https://openalex.org/W2120839853","https://openalex.org/W2121539488","https://openalex.org/W2132172731","https://openalex.org/W2134429122","https://openalex.org/W2135032661","https://openalex.org/W2135157467","https://openalex.org/W2136186853","https://openalex.org/W2138992486","https://openalex.org/W2139685559","https://openalex.org/W2147929033","https://openalex.org/W2154448764","https://openalex.org/W2154496743","https://openalex.org/W2157010176","https://openalex.org/W2170961388","https://openalex.org/W2171295941","https://openalex.org/W2294395356","https://openalex.org/W2914118864","https://openalex.org/W2914563499","https://openalex.org/W2914982603","https://openalex.org/W3005123096","https://openalex.org/W6632784999","https://openalex.org/W6677228968","https://openalex.org/W6682311248"],"related_works":["https://openalex.org/W4256170434","https://openalex.org/W4233948907","https://openalex.org/W4235220108","https://openalex.org/W4315650027","https://openalex.org/W4238894392","https://openalex.org/W2357607877","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W4311722428","https://openalex.org/W4252054168"],"abstract_inverted_index":{"Online":[0],"applications":[1,49],"are":[2,120],"vulnerable":[3],"to":[4,15,18,77,100,112,196,202,210],"theft":[5],"of":[6,45,66,93,95,128,138,141,162,220],"sensitive":[7,215],"information":[8],"because":[9,22],"adversaries":[10],"can":[11,72,85,154],"exploit":[12],"software":[13],"bugs":[14],"gain":[16],"access":[17,99,111],"private":[19],"data,":[20,114],"and":[21,29,39,115,188,217],"curious":[23],"or":[24],"malicious":[25],"administrators":[26],"may":[27],"capture":[28],"leak":[30],"data.":[31,102],"CryptDB":[32,71,153,174],"is":[33,132],"a":[34,64,82,104,106,139,147,184],"system":[35],"that":[36,81,101,152,173],"provides":[37],"practical":[38],"provable":[40],"confidentiality":[41],"in":[42,167],"the":[43,91,96,126,163,168],"face":[44],"these":[46],"attacks":[47],"for":[48,160,182,191,224],"backed":[50],"by":[51,56,89,180,189],"SQL":[52,58,144],"databases.":[53],"It":[54],"works":[55],"executing":[57],"queries":[59,145,192],"over":[60,157],"encrypted":[61,158],"data":[62,83,127,159],"using":[63,90],"collection":[65],"efficient":[67],"SQL-aware":[68],"encryption":[69,75,200],"schemes.":[70],"also":[73],"chain":[74],"keys":[76,201],"user":[78,130,203],"passwords,":[79],"so":[80],"item":[84],"be":[86],"decrypted":[87,113],"only":[88],"password":[92],"one":[94],"users":[97],"with":[98],"As":[103],"result,":[105],"database":[107],"administrator":[108],"never":[109],"gets":[110],"even":[116],"if":[117],"all":[118],"servers":[119],"compromised,":[121],"an":[122],"adversary":[123],"cannot":[124],"decrypt":[125],"any":[129],"who":[131],"not":[133],"logged":[134],"in.":[135],"An":[136],"analysis":[137],"trace":[140],"126":[142],"million":[143],"from":[146,193],"production":[148],"MySQL":[149],"server":[150],"shows":[151,172],"support":[155],"operations":[156],"99.5%":[161],"128,840":[164],"columns":[165],"seen":[166],"trace.":[169],"Our":[170],"evaluation":[171],"has":[175],"low":[176],"overhead,":[177],"reducing":[178],"throughput":[179],"14.5%":[181],"phpBB,":[183],"web":[185,227],"forum":[186],"application,":[187],"26%":[190],"TPC-C,":[194],"compared":[195],"unmodified":[197],"MySQL.":[198],"Chaining":[199],"passwords":[204],"requires":[205],"11--13":[206],"unique":[207],"schema":[208],"annotations":[209],"secure":[211],"more":[212],"than":[213],"20":[214],"fields":[216],"2--7":[218],"lines":[219],"source":[221],"code":[222],"changes":[223],"three":[225],"multi-user":[226],"applications.":[228]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":49},{"year":2024,"cited_by_count":45},{"year":2023,"cited_by_count":56},{"year":2022,"cited_by_count":45},{"year":2021,"cited_by_count":66},{"year":2020,"cited_by_count":103},{"year":2019,"cited_by_count":113},{"year":2018,"cited_by_count":106},{"year":2017,"cited_by_count":128},{"year":2016,"cited_by_count":104},{"year":2015,"cited_by_count":121},{"year":2014,"cited_by_count":94},{"year":2013,"cited_by_count":69},{"year":2012,"cited_by_count":30}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
