Integrity-Based Attacks For Encrypted Databases And Implications