메뉴 건너뛰기




Volumn 21, Issue 5, 2010, Pages 991-1006

Database as a service-security and privacy preserving

Author keywords

Access control policy; DaaS (database as a service); Data completeness; Data confidentiality; Data integrity

Indexed keywords

ACCESS CONTROL POLICIES; DATA COMPLETENESS; DATA CONFIDENTIALITY; DATA INTEGRITY; DATABASE AS A SERVICE;

EID: 77953238222     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1001.2010.03746     Document Type: Article
Times cited : (15)

References (54)
  • 2
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. ACM Trans. on Storage, 2006, 2(2): 107-138.
    • (2006) ACM Trans. on Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 6
    • 0019573099 scopus 로고
    • A database encryption system with subkeys
    • doi: 10.1145/319566.319580
    • Davida GI, Wells DL, Kam JB. A database encryption system with subkeys. ACM Trans. on Database Systems, 1981, 6(2):312-328. [doi: 10.1145/319566.319580]
    • (1981) ACM Trans. on Database Systems , vol.6 , Issue.2 , pp. 312-328
    • Davida, G.I.1    Wells, D.L.2    Kam, J.B.3
  • 8
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database service provider model
    • New York: ACM Press
    • Hacigümüs H, Iyer B, Mehrotra S, Li C. Executing SQL over encrypted data in the database service provider model. In: Proc. of the ACM SIGMOD Conf. New York: ACM Press, 2002. 216-227.
    • (2002) Proc. of the ACM SIGMOD Conf , pp. 216-227
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 10
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • In: Nascimento MA, -zsu MT, Kossmann D, Miller, Blakeley RJJA, Schiefer KB, eds, New York: ACM Press
    • Hore B, Mehrotra S, Tsudik G. A privacy-preserving index for range queries. In: Nascimento MA, -zsu MT, Kossmann D, Miller, Blakeley RJJA, Schiefer KB, eds. Proc. of the 13th Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2004. 720-731.
    • (2004) Proc. of the 13th Int'l Conf. on Very Large Data Bases , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 13
    • 26444524370 scopus 로고    scopus 로고
    • Efficiency, security trade-off in supporting range queries on encrypted databases
    • LNCS 3654, Heidelberg, Berlin: Springer-Verlag
    • Li J, Omiecinski ER. Efficiency, security trade-off in supporting range queries on encrypted databases. In: Proc. of the IFIP Conf. on Database and Applications Security. LNCS 3654, Heidelberg, Berlin: Springer-Verlag, 2005. 69-83.
    • (2005) Proc. of the IFIP Conf. on Database and Applications Security , pp. 69-83
    • Li, J.1    Omiecinski, E.R.2
  • 14
    • 84991010622 scopus 로고    scopus 로고
    • Anti-Tamper databases: Processing aggregate queries over encrypted databases
    • LNCS 4127, Heidelberg, Berlin: Springer-Verlag
    • Chung SS, Ozsoygolu G. Anti-Tamper databases: Processing aggregate queries over encrypted databases. In: Proc. of the 22nd Int'l Conf. on Data Engineering Workshops. LNCS 4127, Heidelberg, Berlin: Springer-Verlag, 2006. 89-103.
    • (2006) Proc. of the 22nd Int'l Conf. on Data Engineering Workshops , pp. 89-103
    • Chung, S.S.1    Ozsoygolu, G.2
  • 15
    • 84989338883 scopus 로고    scopus 로고
    • Answering aggregation queries in a secure system model
    • In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
    • Ge TJ, Zdonik SB. Answering aggregation queries in a secure system model. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 519-530.
    • (2007) Proc. of the 33rd Int'l Conf. on Very Large Data Bases , pp. 519-530
    • Ge, T.J.1    Zdonik, S.B.2
  • 16
    • 33646793324 scopus 로고    scopus 로고
    • Abacus: A distributed middleware for privacy preserving data sharing across private data warehouses
    • LNCS 3790, Heidelberg, Berlin: Springer-Verlag
    • Emekci F, Agrawal D, ElAbbadi AE. Abacus: A distributed middleware for privacy preserving data sharing across private data warehouses. In: Proc. of ACM/IFIP/USENIX the 6th Int'l Middleware Conf. LNCS 3790, Heidelberg, Berlin: Springer-Verlag, 2005. 21-41.
    • (2005) Proc. of ACM/IFIP/USENIX the 6th Int'l Middleware Conf , pp. 21-41
    • Emekci, F.1    Agrawal, D.2    ElAbbadi, A.E.3
  • 17
    • 33749610153 scopus 로고    scopus 로고
    • Privacy preserving query processing using third parties
    • In: Barga RS, Zhou XF, eds. Washington: IEEE Computer Society Press
    • Emekci F, Agrawal D, Abbadi AE, Gulbeden A. Privacy preserving query processing using third parties. In: Barga RS, Zhou XF, eds. Proc. of the Int'l Conf. on Data Engineering. Washington: IEEE Computer Society Press, 2006. 27.
    • (2006) Proc. of the Int'l Conf. on Data Engineering , pp. 27
    • Emekci, F.1    Agrawal, D.2    Abbadi, A.E.3    Gulbeden, A.4
  • 18
    • 77953275954 scopus 로고
    • Harbin: Heilongjiang Education Press, (in Chinese)
    • Cao ZF. The Public Cryptography. Harbin: Heilongjiang Education Press, 1993. 158-195 (in Chinese).
    • (1993) The Public Cryptography , pp. 158-195
    • Cao, Z.F.1
  • 19
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11):612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 21
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • New York: ACM Press
    • Pang H, Jain A, Ramamritham K, Tan KL. Verifying completeness of relational query results in data publishing. In: Ozcan F, ed. Proc. of the ACM SIGMOD Conf. New York: ACM Press, 2005. 407-418.
    • (2005) Proc. of the ACM SIGMOD Conf , pp. 407-418
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.L.4
  • 22
    • 33745528450 scopus 로고    scopus 로고
    • Authentication of outsourced database using signature aggregation and chaining
    • In: Lee ML, Tan KL, eds. LNCS 3882, Heidelberg, Berlin: Springer-Verlag
    • Narasimha M, Tsudik G. Authentication of outsourced database using signature aggregation and chaining. In: Lee ML, Tan KL, eds. Proc. of the 11th Int'l Conf. on Database Systems for Advanced Application. LNCS 3882, Heidelberg, Berlin: Springer-Verlag, 2006, 420-436.
    • (2006) Proc. of the 11th Int'l Conf. on Database Systems for Advanced Application , pp. 420-436
    • Narasimha, M.1    Tsudik, G.2
  • 23
    • 79952940395 scopus 로고    scopus 로고
    • Secure data outsourcing
    • In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
    • Sion R. Secure data outsourcing. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 1431-1432.
    • (2007) Proc. of the 33rd Int'l Conf. on Very Large Data Bases , pp. 1431-1432
    • Sion, R.1
  • 24
    • 84997556980 scopus 로고    scopus 로고
    • Integrity audit of outsourced data
    • In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
    • Xie M, Wang HS, Yin J, Meng XF. Integrity audit of outsourced data. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 782-793.
    • (2007) Proc. of the 33rd Int'l Conf. on Very Large Data Bases , pp. 782-793
    • Xie, M.1    Wang, H.S.2    Yin, J.3    Meng, X.F.4
  • 25
    • 43349091759 scopus 로고    scopus 로고
    • Providing freshness guarantees for outsourced databases
    • In: Kemper A, Valduriez P, Mouaddib N, Teubner J, Bouzeghoub M, Markl V, Amsaleg L, Manolescu I, eds. Vol.261. New York: ACM Press
    • Xie M, Wang HX, Yin J, Meng XF. Providing freshness guarantees for outsourced databases. In: Kemper A, Valduriez P, Mouaddib N, Teubner J, Bouzeghoub M, Markl V, Amsaleg L, Manolescu I, eds. Proc. of the 11th Int'l Conf. on Extending Database Technology: Advances in Database Technology, Vol.261. New York: ACM Press, 2008. 323-332.
    • (2008) Proc. of the 11th Int'l Conf. on Extending Database Technology: Advances in Database Technology , pp. 323-332
    • Xie, M.1    Wang, H.X.2    Yin, J.3    Meng, X.F.4
  • 26
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced database
    • In: Bohm K, Jensen CS, eds. New York: ACM Press
    • Sion R. Query execution assurance for outsourced database. In: Bohm K, Jensen CS, eds. Proc. of the 31st Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2005. 601-612.
    • (2005) Proc. of the 31st Int'l Conf. on Very Large Data Bases , pp. 601-612
    • Sion, R.1
  • 28
    • 58149462240 scopus 로고    scopus 로고
    • Partially materialized digest scheme: An efficient verification method for outsourced databases
    • doi: 10.1007/s00778-008-0108-z
    • Mouratidis K, Sacharidis D. Pang H. Partially materialized digest scheme: An efficient verification method for outsourced databases. The VLDB Journal, 2009, 18(1):363-381. [doi: 10.1007/s00778-008-0108-z]
    • (2009) The VLDB Journal , vol.18 , Issue.1 , pp. 363-381
    • Mouratidis, K.1    Sacharidis, D.2    Pang, H.3
  • 29
    • 40049111546 scopus 로고    scopus 로고
    • Verifying completeness of relational query answers from online servers
    • doi: 10.1145/1330332.1330337
    • Pang H, Tan KL. Verifying completeness of relational query answers from online servers. ACM Trans. on Information and System Security, 2008, 11(2):1-50. [doi: 10.1145/1330332.1330337]
    • (2008) ACM Trans. on Information and System Security , vol.11 , Issue.2 , pp. 1-50
    • Pang, H.1    Tan, K.L.2
  • 31
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • doi: 10.1145/293347.293350
    • Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. Journal of the ACM, 1998, 45(6):965-982. [doi: 10.1145/293347.293350]
    • (1998) Journal of the ACM , vol.45 , Issue.6 , pp. 965-982
    • Chor, B.1    Goldreich, O.2    Kushilevitz, E.3    Sudan, M.4
  • 32
    • 70350677619 scopus 로고    scopus 로고
    • 1/3) lower bound for bilinear group-based private information retrieval
    • doi: 10.4086/toc.2007.v003a012
    • 1/3) lower bound for bilinear group-based private information retrieval. Theory of Computing, 2007, 3(1):221-238. [doi: 10.4086/toc.2007.v003a012]
    • (2007) Theory of Computing , vol.3 , Issue.1 , pp. 221-238
    • Razborov, A.A.1    Yekhanin, S.2
  • 33
    • 34547151180 scopus 로고    scopus 로고
    • Robust information-theoretic private information retrieval
    • Beime A, Stahl Y. Robust information-theoretic private information retrieval. Journal of Cryptology, 2002, 20(3):295-321.
    • (2002) Journal of Cryptology , vol.20 , Issue.3 , pp. 295-321
    • Beime, A.1    Stahl, Y.2
  • 34
    • 84872370949 scopus 로고    scopus 로고
    • Java implementation of a single-database computationally symmetric private information retrieval (cSPIR) protocol
    • Technical Report, YALEU/DCS/TR-1333, Department of Computer Science, Yale University
    • Saint-Jean F. Java implementation of a single-database computationally symmetric private information retrieval (cSPIR) protocol. Technical Report, YALEU/DCS/TR-1333, Department of Computer Science, Yale University, 2005.
    • (2005)
    • Saint-Jean, F.1
  • 36
    • 21144442219 scopus 로고    scopus 로고
    • A survey on private information retrieval
    • Gasarch W. A survey on private information retrieval. Bulletin of the EATCS, 2004, 82:72-107.
    • (2004) Bulletin of the EATCS , vol.82 , pp. 72-107
    • Gasarch, W.1
  • 37
    • 40549114927 scopus 로고    scopus 로고
    • Towards 3-query locally decodable codes of subexponential length
    • Yekhanin S. Towards 3-query locally decodable codes of subexponential length. Journal of the ACM, 2008, 55(1):1-16.
    • (2008) Journal of the ACM , vol.55 , Issue.1 , pp. 1-16
    • Yekhanin, S.1
  • 38
    • 51749087083 scopus 로고    scopus 로고
    • Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers
    • Washington: IEEE Computer Society Press
    • Kedlaya KS, Yekhanin S. Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers. In: Proc. of the 2008 IEEE 23rd Annual Conf. on Computational Complexity. Washington: IEEE Computer Society Press, 2007. 175-186.
    • (2007) Proc. of the 2008 IEEE 23rd Annual Conf. on Computational Complexity , pp. 175-186
    • Kedlaya, K.S.1    Yekhanin, S.2
  • 39
    • 85141026002 scopus 로고    scopus 로고
    • On the computational practicality of private information retrieval
    • Sion R, Carbunar B. On the computational practicality of private information retrieval. 2007. http://citeseerx.ist.psu.edu/viewdoc/ summary-doi=10.1.1.70.793
    • (2007)
    • Sion, R.1    Carbunar, B.2
  • 40
    • 34548787882 scopus 로고    scopus 로고
    • Improving the robustness of private information retrieval
    • Washington: IEEE Computer Society Press
    • Goldberg I. Improving the robustness of private information retrieval. In: Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society Press, 2007. 131-148.
    • (2007) Proc. of the 2007 IEEE Symp. on Security and Privacy , pp. 131-148
    • Goldberg, I.1
  • 42
    • 77953241139 scopus 로고    scopus 로고
    • Key management method for cryptographically enforced access control
    • Zych A, Petkovi M. Key management method for cryptographically enforced access control. 2006. https://www.cosic.esat.kuleuven. be/wissec2006/papers/5.pdf
    • (2006)
    • Zych, A.1    Petkovi, M.2
  • 45
    • 85011043313 scopus 로고    scopus 로고
    • Over-Encryption: Management of access control evolution on outsourced data
    • In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. New York: ACM Press
    • De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Over-Encryption: Management of access control evolution on outsourced data. In: Koch C, Gehrke J, Garofalakis MN, Srivastava D, Aberer K, Deshpande A, Florescu D, Chan CY, Ganti V, Kanne CC, Klas W, Neuhold EJ, eds. Proc. of the 33rd Int'l Conf. on Very Large Data Bases. New York: ACM Press, 2007. 123-134.
    • Proc. of the 33rd Int'l Conf. on Very Large Data Bases
    • De Capitani, V.S.1    Foresti, S.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 49
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • In: Freytag JC, Lockemann PC, eds. Berlin: VLDB Endowment
    • Miklau G, Suciu D. Controlling access to published data using cryptography. In: Freytag JC, Lockemann PC, eds. Proc. of the 29th VLDB. Berlin: VLDB Endowment, 2003. 898-909.
    • (2003) Proc. of the 29th VLDB , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 51
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • doi: 10.1145/357369.357372
    • Akl SG, Taylor PD. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. on Computer System, 1983, 1(3):239-248. [doi: 10.1145/357369.357372]
    • (1983) ACM Trans. on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 52
    • 35448952234 scopus 로고    scopus 로고
    • Ghostdb: Querying visible and hidden data without leaks
    • In: Chan CY, Ooi BC, Zhou AY, eds. New York: ACM Press
    • Anciaux N, Benzine M, Bouganim L, Pucheral P, Shasha D. Ghostdb: Querying visible and hidden data without leaks. In: Chan CY, Ooi BC, Zhou AY, eds. Proc. of the ACM SIGMOD Conf. New York: ACM Press, 2007. 677-688.
    • (2007) Proc. of the ACM SIGMOD Conf , pp. 677-688
    • Anciaux, N.1    Benzine, M.2    Bouganim, L.3    Pucheral, P.4    Shasha, D.5
  • 54


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.