메뉴 건너뛰기




Volumn , Issue , 2011, Pages 515-525

Sedic: Privacy-aware data intensive computing on hybrid clouds

Author keywords

Automatic program analysis; Cloud security; Computation split; Data privacy; MapReduce

Indexed keywords

AUTOMATIC PROGRAMS; CLOUD SERVICES; COMPUTING WORKLOADS; COMPUTING-TASK; DATA BLOCKS; DATA PLACEMENT; DATA-INTENSIVE COMPUTING; DISTRIBUTED FILE SYSTEMS; LEGACY CODE; MAP TASK; MAP-REDUCE; OUTSOURCE; PRIVACY CONCERNS; PRIVATE DATA; SECURITY LEVEL; SENSITIVE DATAS; USER DATA;

EID: 80755169468     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046767     Document Type: Conference Paper
Times cited : (131)

References (49)
  • 3
    • 80755159945 scopus 로고    scopus 로고
    • Amazon virtual private cloud. http://aws.amazon.com/vpc/, 2011.
    • (2011)
  • 5
    • 84864562068 scopus 로고    scopus 로고
    • Darpa intrusion detection data set. http://www.ll.mit.edu/mission/ communications/ist/corpora/ideval/data/index.html, 2011.
    • (2011) Darpa Intrusion Detection Data Set
  • 6
  • 7
    • 80755127592 scopus 로고    scopus 로고
    • Future grid portal. https://portal.futuregrid.org/, 2011.
    • (2011)
  • 12
    • 80755173892 scopus 로고    scopus 로고
    • Spam archieve. http://untroubled.org/spam/, 2011.
    • (2011) Spam Archieve
  • 14
    • 80755172969 scopus 로고    scopus 로고
    • Target marketing. http://en.wikipedia.org/wiki/Target-market, 2011.
    • (2011) Target Marketing
  • 17
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • DOI 10.1007/s10207-005-0070-3
    • M. J. Atallah and J. Li. Secure outsourcing of sequence comparisons. Int. J. Inf. Secur., 4:277-287, October 2005. (Pubitemid 41554602)
    • (2005) International Journal of Information Security , vol.4 , Issue.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2
  • 18
    • 70349755377 scopus 로고    scopus 로고
    • Blueprint for the intercloud - Protocols and formats for cloud computing interoperability
    • International Conference on
    • D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow. Blueprint for the intercloud - protocols and formats for cloud computing interoperability. Internet and Web Applications and Services, International Conference on, 0:328-336, 2009.
    • (2009) Internet and Web Applications and Services , pp. 328-336
    • Bernstein, D.1    Ludvigson, E.2    Sankar, K.3    Diamond, S.4    Morrow, M.5
  • 19
    • 77958487669 scopus 로고    scopus 로고
    • Secure outsourcing of dna searching via finite automata
    • S. Foresti and S. Jajodia, editors Springer
    • M. Blanton and M. Aliasgari. Secure outsourcing of dna searching via finite automata. In S. Foresti and S. Jajodia, editors, DBSec, volume 6166 of Lecture Notes in Computer Science, pages 49-64. Springer, 2010.
    • (2010) DBSec, Volume 6166 of Lecture Notes in Computer Science , pp. 49-64
    • Blanton, M.1    Aliasgari, M.2
  • 21
    • 41149124878 scopus 로고    scopus 로고
    • Secure web application via automatic partitioning
    • DOI 10.1145/1294261.1294265, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
    • S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, and X. Zheng. Secure web applications via automatic partitioning. SIGOPS Oper. Syst. Rev., 41:31-44, October 2007. (Pubitemid 351429368)
    • (2007) Operating Systems Review (ACM) , pp. 31-44
    • Chong, S.1    Liu, J.2    Myers, A.C.3    Qi, X.4    Vikram, K.5    Zheng, L.6    Zheng, X.7
  • 22
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • January
    • J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107-113, January 2008.
    • (2008) Commun. ACM , vol.51 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 23
    • 37549003336 scopus 로고    scopus 로고
    • Mapreduce: Simplified data processing on large clusters
    • January
    • J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Commun. ACM, 51:107-113, January 2008.
    • (2008) Commun. ACM , vol.51 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 25
    • 84883298285 scopus 로고    scopus 로고
    • P4p: Practical large-scale privacy-preserving distributed computation robust against malicious users abstract
    • Washington, DC, August
    • Y. Duan, N. Youdao, J. Canny, and J. Zhan. P4p: Practical large-scale privacy-preserving distributed computation robust against malicious users abstract. In Proceedings of the 19th USENIX Security Symposium, Washington, DC, August 2010.
    • (2010) Proceedings of the 19th USENIX Security Symposium
    • Duan, Y.1    Youdao, N.2    Canny, J.3    Zhan, J.4
  • 28
    • 80755127585 scopus 로고    scopus 로고
    • T. A. S. Foundation
    • T. A. S. Foundation. Apache Hadoop Project. http://hadoop.apache.org/, 2010.
    • (2010)
  • 29
    • 80755172972 scopus 로고    scopus 로고
    • Cloud computing fundamentals
    • B. Furht and A. Escalante, editors Springer US
    • B. Furht. Cloud computing fundamentals. In B. Furht and A. Escalante, editors, Handbook of Cloud Computing, pages 3-19. Springer US, 2010.
    • (2010) Handbook of Cloud Computing , pp. 3-19
    • Furht, B.1
  • 31
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
    • S. Hohenberger and A. Lysyanskaya. How to securely outsource cryptographic computations. In J. Kilian, editor, Theory of Cryptography, volume 3378 of Lecture Notes in Computer Science, pages 264-282. Springer Berlin / Heidelberg, 2005. (Pubitemid 41231169)
    • (2005) Lecture Notes in Computer Science , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 39
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol. , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.C.1    Liskov, B.2
  • 41
    • 85015649873 scopus 로고    scopus 로고
    • Airavat: Security and privacy for mapreduce
    • USENIX Association
    • I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for mapreduce. In NSDI, pages 297-312. USENIX Association, 2010.
    • (2010) NSDI , pp. 297-312
    • Roy, I.1    Setty, S.T.V.2    Kilzer, A.3    Shmatikov, V.4    Witchel, E.5
  • 42
    • 65649120715 scopus 로고    scopus 로고
    • CloudBurst: Highly sensitive read mapping with MapReduce
    • M. C. Schatz. CloudBurst: highly sensitive read mapping with MapReduce. Bioinformatics, 25(11):1363-1369, 2009.
    • (2009) Bioinformatics , vol.25 , Issue.11 , pp. 1363-1369
    • Schatz, M.C.1
  • 43
    • 80755159942 scopus 로고    scopus 로고
    • A. W. Services December As of
    • A. W. Services. Aws case study: Washington post. http://aws.amazon.com/ solutions/case-studies/washington-post/, December As of 2010.
    • (2010) Aws Case Study: Washington Post
  • 44
    • 85129493630 scopus 로고    scopus 로고
    • Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm
    • The Internet Society
    • D. Szajda, M. Pohl, J. Owen, and B. G. Lawson. Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm. In NDSS. The Internet Society, 2006.
    • (2006) NDSS
    • Szajda, D.1    Pohl, M.2    Owen, J.3    Lawson, B.G.4
  • 45
    • 66149192669 scopus 로고    scopus 로고
    • How to map billions of short reads onto genomes
    • May
    • C. Trapnell and S. L. Salzberg. How to map billions of short reads onto genomes. Nature biotechnology, 27(5):455-457, May 2009.
    • (2009) Nature Biotechnology , vol.27 , Issue.5 , pp. 455-457
    • Trapnell, C.1    Salzberg, S.L.2
  • 47
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • INFOCOM'10 Piscataway, NJ, USA IEEE Press
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on Information communications, INFOCOM'10, pages 525-533, Piscataway, NJ, USA, 2010. IEEE Press.
    • (2010) Proceedings of the 29th Conference on Information Communications , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 49
    • 35248872290 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving classification of customer data without loss of accuracy. In In SIAM SDM, pages 21-23, 2005.
    • (2005) SIAM SDM , pp. 21-23
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.