queries, so a careful consideration of the mix of 
queries is important.  
Overall computational resource requirements are 
increased due to the need for encryption, extra logic, 
and processing, with an overall increase of a small 
factor over the unencrypted computing resources. 
This factor may vary depending on the particular 
application and mix of queries.  
Performance with multiple users showed good 
scalability, with no observable encryption-related 
latency.  
Using CryptDB with an encrypted database is 
feasible for moving a sensitive database to an 
untrusted cloud hosting environment. The latency 
performance is comparable to the use of an 
unencrypted database, and comparable throughput 
can be achieved with additional resources to support 
the encryption-related computation. 
6 FUTURE WORK 
Follow-on work to this study includes testing on an 
operational Oracle ERP system under normal use 
cases and workflows.  
Additional extensions and improvements are 
planned for CryptDB, and PL/SQL support is to be 
expanded. Performance improvement for Paillier 
encryption may be possible using GPUs, which 
should improve performance and reduce the load on 
the CPU. This will provide the benefits of improved 
scalability for Paillier encryption and reduced CPU 
contention for other queries.  
It was noted earlier that there are possible 
leakages of information about plaintext through 
some of the encryption schemes. For example, 
relative sizes and distributions of numbers can be 
calculated for OPE encryption, which could lead to a 
few known values revealing other encrypted values.  
This leakage cannot be completely eliminated, 
but it can be reduced by various methods. First, 
additional entries can be added to the database to 
smooth out the distribution of values. Additional 
queries would be inserted periodically to access 
these otherwise unused values. Second, existing 
entries with the same values can be split into 
different categories by CryptDB so that they appear 
different in the database. Third, encryption keys can 
be changed periodically. These all impose a resource 
burden on the system through additional storage and 
computation.  
ACKNOWLEDGEMENTS 
The authors wish to acknowledge Virgil Gligor for 
his deep insights and broad knowledge in 
homomorphic encryption and related areas.  
REFERENCES 
Acar, A., Aksu, H., Uluagac, A. S., and Conti, M. A. 
Survey on Homomorphic Encryption Schemes: 
Theory and Implementation. arXiv preprint 
arXiv:1704.03578v1, April 12, 2017. 
Akin, I. H., and Berk, S. 2015. “On the Difficulty of 
Securing Web Applications using CryptDB,” 
International Association for Cryptologic Research. 
Available at https://eprint.iacr.org/2015/082.  
Foltz, K. and Simpson, W. Enterprise Level Security with 
Homomorphic Encryption. In Proceedings of 19
th
 
International Conference on Enterprise Information 
Systems (ICEIS 2017), Porto, Portugal, April 26–29, 
2017. 
Gentry, C. 2009. “A Fully Homomorphic Encryption 
Scheme.” Doctoral thesis. Stanford University. 
Available at https://crypto.stanford.edu/craig/craig-
thesis.pdf.  
Gligor, V. 2014. “Homomorphic Computations in Secure 
System Design,” Final Report. Pittsburgh, PA: 
Carnegie Mellon University.  
Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., and Wong, D. 
S. “L-encdb: A lightweight framework for privacy-
preserving data queries in cloud computing,” Knowl.-
Based Syst., vol. 79, pp. 18–26, 2015. 
Macedo, R. et al., “A Practical Framework for Privacy-
Preserving NoSQL Databases,” 2017 IEEE 36th 
Symposium on Reliable Distributed Systems (SRDS), 
Hong Kong, 2017, pp. 11–20. 
Naveed, M., Kamara, S., and Wright, C. V. “Inference 
Attacks on Property-Preserving Encrypted Databases.” 
In: CCS’15, Denver, CO, 2015. 
Pattuk, E.,  Kantarcioglu, M., Khadilkar, V., Ulusoy, H., 
and Mehrotra, S. “Bigsecret: A secure data 
management framework for key-value stores,” 
International Conference on Cloud Computing, 2013. 
Popa, R. A., Redfield, C. M.S., Zeldovich, N., and 
Balakrishnan, H. 2012 “CryptDB: Processing Queries 
on an Encrypted Database,” Comm. ACM, vol. 55, no 
9, Sept. 2012 (also Proc. of 23rd ACM SoSP, Sept. 
2011). 
Tu, S., Kaashoek, M. F., Madden, S., and Zeldovich, N. 
“Processing analytical queries over encrypted data,” 
Proc. VLDB Endow., 2013.