메뉴 건너뛰기




Volumn , Issue , 2013, Pages 1268-1271

Secure and privacy-preserving database services in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD SECURITIES; DATA CONFIDENTIALITY; DATA SECURITY AND PRIVACY; DATABASE SERVICE; PRIVACY PRESERVING; RECENT RESEARCHES; SECURITY AND PRIVACY; STATE-OF-THE-ART SCHEME;

EID: 84881362635     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2013.6544921     Document Type: Conference Paper
Times cited : (23)

References (41)
  • 1
    • 84855612158 scopus 로고    scopus 로고
    • "AWS Solution Providers," http://aws.amazon.com/solutions/ solution-providers/, 2009.
    • (2009) AWS Solution Providers
  • 2
    • 84855608651 scopus 로고    scopus 로고
    • "AWS Case Studies," http://aws.amazon.com/solutions/case- studies/, 2009.
    • (2009) AWS Case Studies
  • 4
    • 80955143542 scopus 로고    scopus 로고
    • All your clouds are belong to us: Security analysis of cloud management interfaces
    • Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM
    • J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, "All your clouds are belong to us: security analysis of cloud management interfaces," in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 3-14.
    • (2011) CCSW '11 , pp. 3-14
    • Somorovsky, J.1    Heiderich, M.2    Jensen, M.3    Schwenk, J.4    Gruschka, N.5    Lo Iacono, L.6
  • 12
    • 82655162816 scopus 로고    scopus 로고
    • CryptDB: Protecting confidentiality with encrypted query processing
    • Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ser.
    • R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, ser. SOSP '11, 2011, pp. 85-100.
    • (2011) SOSP '11 , pp. 85-100
    • Popa, R.A.1    Redfield, C.M.S.2    Zeldovich, N.3    Balakrishnan, H.4
  • 16
    • 80052699824 scopus 로고    scopus 로고
    • A comprehensive framework for secure query processing on relational data in the cloud
    • Proceedings of the 8th VLDB international conference on Secure data management, ser. Berlin, Heidelberg: Springer-Verlag
    • S. Wang, D. Agrawal, and A. El Abbadi, "A comprehensive framework for secure query processing on relational data in the cloud," in Proceedings of the 8th VLDB international conference on Secure data management, ser. SDM'11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 52-69.
    • (2011) SDM'11 , pp. 52-69
    • Wang, S.1    Agrawal, D.2    El Abbadi, A.3
  • 17
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology - EUROCRYPT '99, ser. Springer Berlin / Heidelberg
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology - EUROCRYPT '99, ser. Lecture Notes in Computer Science, vol. 1592. Springer Berlin / Heidelberg, 1999, pp. 223-238.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 20
    • 77649240581 scopus 로고    scopus 로고
    • Computing arbitrary functions of encrypted data
    • -, "Computing arbitrary functions of encrypted data," Commun. ACM, vol. 53, pp. 97-105, 2010.
    • (2010) Commun. ACM , vol.53 , pp. 97-105
    • Gentry, C.1
  • 21
    • 80955157888 scopus 로고    scopus 로고
    • Can homomorphic encryption be practical?
    • Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. New York, NY, USA: ACM
    • M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?" in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, ser. CCSW '11. New York, NY, USA: ACM, 2011, pp. 113-124.
    • (2011) CCSW '11 , pp. 113-124
    • Naehrig, M.1    Lauter, K.2    Vaikuntanathan, V.3
  • 22
    • 79959972183 scopus 로고    scopus 로고
    • TrustedDB: A trusted hardware based database with privacy and data confidentiality
    • Proceedings of the 2011 international conference on Management of data, ser.
    • S. Bajaj and R. Sion, "TrustedDB: a trusted hardware based database with privacy and data confidentiality," in Proceedings of the 2011 international conference on Management of data, ser. SIGMOD '11, 2011, pp. 205-216.
    • (2011) SIGMOD '11 , pp. 205-216
    • Bajaj, S.1    Sion, R.2
  • 23
    • 84855974342 scopus 로고    scopus 로고
    • Cloud data protection for the masses
    • D. Song, E. Shi, I. Fischer, and U. Shankar, "Cloud data protection for the masses," IEEE Computer, vol. 45, no. 1, pp. 39-45, 2012.
    • (2012) IEEE Computer , vol.45 , Issue.1 , pp. 39-45
    • Song, D.1    Shi, E.2    Fischer, I.3    Shankar, U.4
  • 24
    • 84929445167 scopus 로고    scopus 로고
    • Towards trusted cloud computing
    • Proceedings of the 2009 conference on Hot topics in cloud computing, ser. Berkeley, CA, USA: USENIX Association
    • N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," in Proceedings of the 2009 conference on Hot topics in cloud computing, ser. HotCloud'09. Berkeley, CA, USA: USENIX Association, 2009.
    • (2009) HotCloud'09
    • Santos, N.1    Gummadi, K.P.2    Rodrigues, R.3
  • 26
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 27
    • 0025154732 scopus 로고
    • Efficient computation on oblivious RAMs
    • Proceedings of the twenty-second annual ACM symposium on Theory of computing, ser.
    • R. Ostrovsky, "Efficient computation on oblivious RAMs," in Proceedings of the twenty-second annual ACM symposium on Theory of computing, ser. STOC '90, 1990, pp. 514-523.
    • (1990) STOC '90 , pp. 514-523
    • Ostrovsky, R.1
  • 34
    • 80955132243 scopus 로고    scopus 로고
    • Towards practical oblivious RAM
    • vol. abs/1106.3652
    • E. Stefanov, E. Shi, and D. Song, "Towards practical oblivious RAM," CoRR, vol. abs/1106.3652, 2011.
    • (2011) CoRR
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 38
    • 84897608009 scopus 로고    scopus 로고
    • Towards practical private processing of database queries over public data
    • to appear
    • S. Wang, D. Agrawal, and A. El Abbadi, "Towards practical private processing of database queries over public data," Distributed and Parallel Databases, 2013, to appear.
    • (2013) Distributed and Parallel Databases
    • Wang, S.1    Agrawal, D.2    El Abbadi, A.3
  • 41
    • 79956318862 scopus 로고    scopus 로고
    • Enforcing end-to-end application security in the cloud (big ideas paper)
    • Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, ser. Berlin, Heidelberg: Springer-Verlag
    • J. Bacon, D. Evans, D. M. Eyers, M. Migliavacca, P. Pietzuch, and B. Shand, "Enforcing end-to-end application security in the cloud (big ideas paper)," in Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, ser. Middleware '10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 293-312.
    • (2010) Middleware '10 , pp. 293-312
    • Bacon, J.1    Evans, D.2    Eyers, D.M.3    Migliavacca, M.4    Pietzuch, P.5    Shand, B.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.