메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1709-1716

Database management as a service: Challenges and opportunities

Author keywords

[No Author keywords available]

Indexed keywords

DATA MANAGEMENT; DATA MANAGEMENT TECHNIQUES; DATA OUTSOURCING; DATA SETS; DATA STORAGE; DATABASE AS A SERVICE; DATABASE MANAGEMENT; DATABASE SERVICE; ENCRYPTED DATA; EXECUTE QUERY; EXPENSIVE HARDWARE; FAULT-TOLERANT; LOW COSTS; MAINTENANCE TASKS; MULTIPLE DATA; PRIVACY PRESERVING; PRIVATE DATA; QUERYING ENCRYPTED DATA; SECRET SHARING ALGORITHM; SOFTWARE UPGRADES; TECHNICAL CONTRIBUTION; THIRD-PARTY SERVICE PROVIDERS; TRUST MECHANISM; UNIVERSAL ACCESS;

EID: 67649635197     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2009.151     Document Type: Conference Paper
Times cited : (130)

References (32)
  • 2
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. of the VLDB Conf., 2004, pp. 720-731.
    • (2004) Proc. of the VLDB Conf , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 10
    • 0001959541 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • E. Kushilevitz and R. Ostrovsky, "Replication is not needed: Single database, computationally-private information retrieval," in Proc. of the FOCS, 1997.
    • (1997) Proc. of the FOCS
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 12
    • 22444454758 scopus 로고    scopus 로고
    • A new and efiicient all-or-nothing disclosure of secrets protocol
    • J. Stern, "A new and efiicient all-or-nothing disclosure of secrets protocol," in Proc. of Asia Crypt, 1998.
    • (1998) Proc. of Asia Crypt
    • Stern, J.1
  • 13
    • 23044519068 scopus 로고    scopus 로고
    • One-way trapdoor permuttions are sufficient for non-trivial single-server private information retrieval
    • E. Kushilevitz and R. Ostrovsky, "One-way trapdoor permuttions are sufficient for non-trivial single-server private information retrieval," in Proc. of the EUROCRYPT, 2000.
    • (2000) Proc. of the EUROCRYPT
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 14
    • 0001090406 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. of the EUROCRYPT, 1999.
    • (1999) Proc. of the EUROCRYPT
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 19
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced database
    • R. Sion, "Query execution assurance for outsourced database," in Proc. of VLDB Conf., 2005.
    • (2005) Proc. of VLDB Conf
    • Sion, R.1
  • 21
    • 34548160016 scopus 로고    scopus 로고
    • Authentication of outsourced database using signature aggregation and chaining
    • M. Narasimha and G. Tsudik, "Authentication of outsourced database using signature aggregation and chaining," in Proc. of DASFAA, 2006.
    • (2006) Proc. of DASFAA
    • Narasimha, M.1    Tsudik, G.2
  • 22
    • 79952940395 scopus 로고    scopus 로고
    • Secure data outsourcing
    • R. Sion, "Secure data outsourcing," in Proc. of the VLDB Conf., 2007, pp. 1431-1432.
    • (2007) Proc. of the VLDB Conf , pp. 1431-1432
    • Sion, R.1
  • 23
    • 84989338883 scopus 로고    scopus 로고
    • Answering aggregation queries in a secure system model
    • T. Ge and S. B. Zdonik, "Answering aggregation queries in a secure system model," in Proc. of the VLDB Conf., 2007, pp. 519-530.
    • (2007) Proc. of the VLDB Conf , pp. 519-530
    • Ge, T.1    Zdonik, S.B.2
  • 28
    • 0031624875 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, "Protecting data privacy in private information retrieval schemes," in Proc. of the STOC, 1998, pp. 151-160.
    • (1998) Proc. of the STOC , pp. 151-160
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 29
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation," in Proc. of the STOC, 1999, pp. 245-254.
    • (1999) Proc. of the STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 32
    • 33749610153 scopus 로고    scopus 로고
    • Privacy preserving query processing using third parties
    • F. Emekçi, D. Agrawal, A. El Abbadi, and A. Gulbeden, "Privacy preserving query processing using third parties." in ICDE, 2006, p. 27.
    • (2006) ICDE , pp. 27
    • Emekçi, F.1    Agrawal, D.2    El Abbadi, A.3    Gulbeden, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.