메뉴 건너뛰기




Volumn 47, Issue 6, 2010, Pages 1107-1115

An integrity checking scheme in outsourced database model

Author keywords

Authenticated data structure; Database security; MABTree; Outsourced database integrity; Verification time

Indexed keywords

COMPUTATIONAL OVERHEADS; DATABASE INTEGRITY; DATABASE MODELS; DATABASE SECURITY; DATABASE SERVICE; EXISTING METHOD; EXPONENTIAL COMPUTATION; FORMAL DEFINITION; INCREMENTAL UPDATING; INTEGRITY CHECK; INTEGRITY CHECKING; MABTREE; OUTSOURCED DATABASE INTEGRITY; POTENTIAL THREATS; QUERY RESULTS; SECURITY MECHANISM; SECURITY PROOFS; STRUCTURE-BASED;

EID: 77954281765     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (19)

References (20)
  • 1
    • 0036204131 scopus 로고    scopus 로고
    • Providing database as a service
    • Washington: IEEE Computer Society
    • Hacigumus H, Iyer B R, Mehrotra S. Providing database as a service [C] //Proc of ICDE. Washington: IEEE Computer Society, 2002: 29-40.
    • (2002) Proc of ICDE , pp. 29-40
    • Hacigumus, H.1    Iyer, B.R.2    Mehrotra, S.3
  • 2
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • New York: ACM
    • Li F F, Hadjieleftheriou M, Kollios G. Dynamic authenticated index structures for outsourced databases [C] //Proc of ACM SIGMOD 2006. New York: ACM, 2006: 121-132.
    • (2006) Proc of ACM SIGMOD 2006 , pp. 121-132
    • Li, F.F.1    Hadjieleftheriou, M.2    Kollios, G.3
  • 3
    • 34250658685 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • New York: ACM
    • Hakan Hacigümüş, Bala Iyer, Chen Li, et al. Executing SQL over encrypted data in the database-service-provider model [C] //Proc of ACM SIGMOD 2001. New York: ACM, 2001: 223-234.
    • (2001) Proc of ACM SIGMOD 2001 , pp. 223-234
    • Hacigümüş, H.1    Iyer, B.2    Chen, L.3
  • 4
    • 3142716056 scopus 로고    scopus 로고
    • Order preserving encryption for numeric data
    • New York: ACM
    • Agrawal R, Kierman J, Srikant R, et al. Order preserving encryption for numeric data [C] //Proc of ACM SIGMOND 2004. New York: ACM, 2004: 563-574.
    • (2004) Proc of ACM SIGMOND 2004 , pp. 563-574
    • Agrawal, R.1    Kierman, J.2    Srikant, R.3
  • 5
    • 54749142104 scopus 로고    scopus 로고
    • Query rewriting algorithm supporting attribute grain database encryption
    • in Chinese
    • Xian Hequn, Feng Dengguo. Query rewriting algorithm supporting attribute grain database encryption [J]. Journal of Computer Research and Development, 2008, 45(8): 1307-1314 (in Chinese).
    • (2008) Journal of Computer Research and Development , vol.45 , Issue.8 , pp. 1307-1314
    • Xian, H.1    Feng, D.2
  • 8
    • 0038274733 scopus 로고    scopus 로고
    • Authentic data publication over the Internet
    • Devanbu P, Gertz M, Martel C, et al. Authentic data publication over the Internet [J]. Journal of Computer Security, 2003, 11(3): 291-314.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 291-314
    • Devanbu, P.1    Gertz, M.2    Martel, C.3
  • 9
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Washington: IEEE Computer Society
    • Pang H, Tan K L. Authenticating query results in edge computing [C] //Proc of ICDE 2004. Washington: IEEE Computer Society, 2004: 560-571.
    • (2004) Proc of ICDE 2004 , pp. 560-571
    • Pang, H.1    Tan, K.L.2
  • 10
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases [J]. ACM Trans on Storage, 2006, 2(2): 107-138.
    • (2006) ACM Trans on Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 11
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • New York: ACM
    • Xie Min, Wang Haixun, Yin Jian, et al. Integrity auditing of outsourced data [C] //Proc of VLDB 2007. New York: ACM, 2007: 782-793.
    • (2007) Proc of VLDB 2007 , pp. 782-793
    • Xie, M.1    Wang, H.2    Yin, J.3
  • 13
    • 77953798786 scopus 로고    scopus 로고
    • Digital watermark-based authentication of queries in outsourced database
    • in Chinese
    • Zu Qin, Chen Jihong, Le Jiajin. Digital watermark-based authentication of queries in outsourced database [J]. Journal of Computer Applications, 2008, 28(3): 605-608 (in Chinese).
    • (2008) Journal of Computer Applications , vol.28 , Issue.3 , pp. 605-608
    • Zu, Q.1    Chen, J.2    Le, J.3
  • 14
    • 40049111546 scopus 로고    scopus 로고
    • Verifying completeness of relational query answers from online servers
    • Pang Hweehwa, Tan Kian-Lee. Verifying completeness of relational query answers from online servers [J]. ACM Trans on Information and System Security, 2008, 11(2): 1-50.
    • (2008) ACM Trans on Information and System Security , vol.11 , Issue.2 , pp. 1-50
    • Pang, H.1    Tan, K.-L.2
  • 18
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • New York: ACM
    • Sion R. Query execution assurance for outsourced databases [C] //Proc of VLDB 2005. New York: ACM, 2005: 601-612.
    • (2005) Proc of VLDB 2005 , pp. 601-612
    • Sion, R.1
  • 19
    • 77954259379 scopus 로고    scopus 로고
    • OpenSSL project
    • [2008-05-01]
    • OpenSSL Project [OL]. [2008-05-01]. http://www.openssl.org.
    • (2008)
  • 20
    • 77954289750 scopus 로고    scopus 로고
    • Benchmark specification
    • TPC-H. [2008-05-01]
    • TPC-H. Benchmark Specification [OL]. [2008-05-01]. http://www.tpc.org.
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.