메뉴 건너뛰기




Volumn 8434 LNCS, Issue , 2014, Pages 28-41

Data security and privacy in the cloud

Author keywords

Cloud computing; confidentiality; data fragmentation; honest but curious servers; inferences; integrity; private access; query integrity; shuffle index

Indexed keywords

CLOUD COMPUTING; SECURITY SYSTEMS;

EID: 84901660441     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-06320-1_4     Document Type: Conference Paper
Times cited : (23)

References (38)
  • 4
    • 38049032965 scopus 로고    scopus 로고
    • Fragmentation and encryption to enforce privacy in data storage
    • Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 171-186
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 5
    • 70350355128 scopus 로고    scopus 로고
    • Keep a few: Outsourcing data while maintaining confidentiality
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 440-455
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 8
    • 84864356094 scopus 로고    scopus 로고
    • Enforcing subscription-based authorization policies in cloud scenarios
    • Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. Springer, Heidelberg
    • De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G.: Enforcing subscription-based authorization policies in cloud scenarios. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 314-329. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7371 , pp. 314-329
    • De Capitani Di Vimercati, S.1    Foresti, S.2    Jajodia, S.3    Livraga, G.4
  • 10
    • 84881159065 scopus 로고    scopus 로고
    • Extending loose associations to multiple fragments
    • Wang, L., Shafiq, B. (eds.) DBSec 2013. Springer, Heidelberg
    • De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Extending loose associations to multiple fragments. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 1-16. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7964 , pp. 1-16
    • De Capitani Di Vimercati, S.1    Foresti, S.2    Jajodia, S.3    Livraga, G.4    Paraboschi, S.5    Samarati, P.6
  • 18
    • 84884738971 scopus 로고    scopus 로고
    • Distributed shuffling for preserving access confidentiality
    • Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
    • DeCapitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Distributed shuffling for preserving access confidentiality. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 628-645. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8134 , pp. 628-645
    • DeCapitani Di Vimercati, S.1    Foresti, S.2    Paraboschi, S.3    Pelosi, G.4    Samarati, P.5
  • 21
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on Oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on Oblivious RAMs. Journal of the ACM 43(3), 431-473 (1996)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 23
    • 84901649420 scopus 로고    scopus 로고
    • Ensuring integrity of encrypted databases in database as a service model
    • De Capitani di Vimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XVII. Springer, Heidelberg
    • Hacigümüş, H., Iyer, B., Mehrotra, S.: Ensuring integrity of encrypted databases in database as a service model. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds.) Data and Applications Security XVII. IFIP, vol. 142, pp. 61-74. Springer, Heidelberg (2004)
    • (2004) IFIP , vol.142 , pp. 61-74
    • Hacigümüş, H.1    Iyer, B.2    Mehrotra, S.3
  • 27
    • 84876800484 scopus 로고    scopus 로고
    • Fault tolerance management in cloud computing: A system-level perspective
    • Jhawar, R., Piuri, V., Santambrogio, M.: Fault tolerance management in cloud computing: A system-level perspective. IEEE Systems Journal 7(2), 288-297 (2013)
    • (2013) IEEE Systems Journal , vol.7 , Issue.2 , pp. 288-297
    • Jhawar, R.1    Piuri, V.2    Santambrogio, M.3
  • 30
    • 84884802064 scopus 로고    scopus 로고
    • Fine-grained access control system based on outsourced attribute-based encryption
    • Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
    • Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592-609. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8134 , pp. 592-609
    • Li, J.1    Chen, X.2    Li, J.3    Jia, C.4    Ma, J.5    Lou, W.6
  • 32
    • 38049002436 scopus 로고    scopus 로고
    • A survey of single-database private information retrieval: Techniques and applications
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Ostrovsky, R., Skeith III, W.E.: A survey of single-database private information retrieval: Techniques and applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393-411. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 393-411
    • Ostrovsky, R.1    Skeith III, W.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.