메뉴 건너뛰기




Volumn 5672 LNCS, Issue , 2009, Pages 185-201

Privacy-preserving computation and verification of aggregate queries on outsourced databases

Author keywords

Aggregate query; Integrity; Outsource; Privacy; Secret sharing; Verification

Indexed keywords

AGGREGATE QUERY; INTEGRITY; OUTSOURCE; PRIVACY; SECRET SHARING;

EID: 69949134141     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03168-7_11     Document Type: Conference Paper
Times cited : (52)

References (33)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Lee, J.M., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Lee, J.M.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 2
    • 0041783510 scopus 로고    scopus 로고
    • Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (May 2000)
    • Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (May 2000)
  • 5
    • 84943527796 scopus 로고    scopus 로고
    • Chumash, T., Yao, D.: Detection and prevention of insider threats in database driven web services. In: Proceedings of The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM) (June 2009)
    • Chumash, T., Yao, D.: Detection and prevention of insider threats in database driven web services. In: Proceedings of The Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM) (June 2009)
  • 6
    • 37849013914 scopus 로고    scopus 로고
    • Privacy-preserving schema matching using mutual information
    • Barker, S, Ahn, G.-J, eds, Data and Applications Security 2007, Springer, Heidelberg
    • Cruz, I.F., Tamassia, R., Yao, D.: Privacy-preserving schema matching using mutual information. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 93-94. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4602 , pp. 93-94
    • Cruz, I.F.1    Tamassia, R.2    Yao, D.3
  • 8
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: PODS, pp. 202-210 (2003)
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 9
    • 84949438251 scopus 로고    scopus 로고
    • Inference Control in Statistical Databases
    • Domingo-Ferrer, J, ed, Springer, Heidelberg
    • Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. LNCS, vol. 2316. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2316
  • 10
    • 70349305273 scopus 로고    scopus 로고
    • Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, 4978, pp. 1-19. Springer, Heidelberg (2008)
    • Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1-19. Springer, Heidelberg (2008)
  • 11
    • 33745556605 scopus 로고    scopus 로고
    • Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 265-284. Springer, Heidelberg (2006)
    • Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
  • 12
    • 69949120750 scopus 로고    scopus 로고
    • Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. CoRR, abs/0803.0032 (2008)
    • Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. CoRR, abs/0803.0032 (2008)
  • 16
    • 24144493423 scopus 로고    scopus 로고
    • Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 264-282. Springer, Heidelberg (2005)
    • Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005)
  • 17
    • 49549109805 scopus 로고    scopus 로고
    • Private inference control for aggregate database queries. In: ICDM Workshops
    • Los Alamitos
    • Jagannathan, G., Wright, R.N.: Private inference control for aggregate database queries. In: ICDM Workshops, pp. 711-716. IEEE Computer Society, Los Alamitos (2007)
    • (2007) IEEE Computer Society , pp. 711-716
    • Jagannathan, G.1    Wright, R.N.2
  • 18
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Chaudhuri, S, Hristidis, V, Polyzotis, N, eds, ACM, New York
    • Li, F., Hadjielef theriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Chaudhuri, S., Hristidis, V., Polyzotis, N. (eds.) SIGMOD Conference, pp. 121-132. ACM, New York (2006)
    • (2006) SIGMOD Conference , pp. 121-132
    • Li, F.1    Hadjielef theriou, M.2    Kollios, G.3    Reyzin, L.4
  • 19
    • 84867540301 scopus 로고    scopus 로고
    • Massell, P., Zayatz, L., Funk, J.: Protecting the confidentiality of survey tabular data by adding noise to the underlying microdata: Application to the commodity flow survey. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, 4302, pp. 304-317. Springer, Heidelberg (2006)
    • Massell, P., Zayatz, L., Funk, J.: Protecting the confidentiality of survey tabular data by adding noise to the underlying microdata: Application to the commodity flow survey. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol. 4302, pp. 304-317. Springer, Heidelberg (2006)
  • 20
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • IEEE Computer Society Press, Los Alamitos
    • Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 122-133. IEEE Computer Society Press, Los Alamitos (1980)
    • (1980) Proceedings of the 1980 Symposium on Security and Privacy , pp. 122-133
    • Merkle, R.1
  • 21
    • 69949189852 scopus 로고    scopus 로고
    • Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (February 2004)
    • Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (February 2004)
  • 22
    • 69949142272 scopus 로고    scopus 로고
    • Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a- service model. In: IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec) (July 2006)
    • Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a- service model. In: IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec) (July 2006)
  • 23
    • 69949188211 scopus 로고    scopus 로고
    • Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: International Conference on Database Systems for Advanced Applications (DASFAA) (April 2006)
    • Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: International Conference on Database Systems for Advanced Applications (DASFAA) (April 2006)
  • 25
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 26
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.