Hello,
I think this is a very interesting topic, especially for European companies
where data sovereignty in the cloud has become critical.

If I understand correctly, the idea is to split users into 'client users'
who can see data unencrypted, and 'server users', who are administrators
unable to decrypt data.

A few questions:
- how are secrets managed? Do you use a sort of vault to keep encryption
keys? Is there a master key to encrypt session keys?
- what about performances? Is it possible to use indexes on encrypted
columns?


Hi all,
>
> We have developed an extension, allowing PostgreSQL to run queries over
> encrypted data. This functionality is achieved via user-defined functions
> that extend encrypted data types and support commonly used expression
> operations. Our tests validated its effectiveness with TPC-C and TPC-H
> benchmarks. You may find the code here: https://github.com/SJTU-IPADS/HEDB
> .
>
> This PoC is a reimplementation fork while collaborating with a cloud
> database company; the aim is to enable their DBAs to manage databases
> without the risk of data leaks, *meeting the requirements of laws such as
> GDPR.*
>
> I am wondering if anyone thinks this is a nice feature. If so, I am
> curious about the steps to further it mature and potentially have it
> incorporated as a part of PostgreSQL contrib.
>
> Best regards,
> Mingyu Li
>


--
best regards
Giampaolo Capelli

Reply via email to