메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1395-1406

Secure query processing with data interoperability in a cloud database environment

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INTEROPERABILITY; QUERY LANGUAGES; QUERY PROCESSING;

EID: 84904311414     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2588555.2588572     Document Type: Conference Paper
Times cited : (84)

References (30)
  • 1
    • 3142716056 scopus 로고    scopus 로고
    • Order-preserving encryption for numeric data
    • R. Agrawal and J. Kiernan et al. Order-preserving encryption for numeric data. In SIGMOD, 2004.
    • (2004) SIGMOD
    • Agrawal, R.1    Kiernan, J.2
  • 2
    • 84880553279 scopus 로고    scopus 로고
    • Secure database-as-a-service with cipherbase
    • A. Arasu et al. Secure database-as-a-service with cipherbase. In SIGMOD, 2013.
    • (2013) SIGMOD
    • Arasu, A.1
  • 3
    • 79959972183 scopus 로고    scopus 로고
    • Trusteddb: A trusted hardware based database with privacy and data confidentiality
    • S. Bajaj et al. Trusteddb: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, 2011.
    • (2011) SIGMOD
    • Bajaj, S.1
  • 4
    • 84894068253 scopus 로고    scopus 로고
    • A universal toolkit for cryptographically secure privacy-preserving data mining
    • D. Bogdanov et al. A universal toolkit for cryptographically secure privacy-preserving data mining. In PAISI, 2012.
    • (2012) PAISI
    • Bogdanov, D.1
  • 5
    • 84881219587 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • A. Boldyreva et al. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011.
    • (2011) CRYPTO
    • Boldyreva, A.1
  • 6
    • 17444370055 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • D. Boneh et al. Public key encryption with keyword search. In EUROCRYPT, 2004.
    • (2004) EUROCRYPT
    • Boneh, D.1
  • 7
    • 18744366643 scopus 로고    scopus 로고
    • Balancing confidentiality and efficiency in untrusted relational dbmss
    • E. Damiani et al. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, 2003.
    • (2003) CCS
    • Damiani, E.1
  • 8
    • 80052578965 scopus 로고    scopus 로고
    • Elastras: An elastic transactional data store in the cloud
    • S. Das and D. Agrawal et al. Elastras: An elastic transactional data store in the cloud. CoRR, 2010.
    • (2010) CoRR
    • Das, S.1    Agrawal, D.2
  • 9
    • 85081815216 scopus 로고    scopus 로고
    • CPU sharing techniques for performance isolation in multi-tenant relational database-as-a-service
    • S. Das, V. Narasayya, and F. Li et al. CPU sharing techniques for performance isolation in multi-tenant relational database-as-a-service. PVLDB, 2014.
    • (2014) PVLDB
    • Das, S.1    Narasayya, V.2    Li, F.3
  • 10
    • 79959957556 scopus 로고    scopus 로고
    • Zephyr: Live migration in shared nothing databases for elastic cloud platforms
    • A. J. Elmore, S. Das, D. Agrawal, and A. El Abbadi. Zephyr: live migration in shared nothing databases for elastic cloud platforms. In SIGMOD, 2011.
    • (2011) SIGMOD
    • Elmore, A.J.1    Das, S.2    Agrawal, D.3    El Abbadi, A.4
  • 11
    • 33749610153 scopus 로고    scopus 로고
    • Privacy preserving query processing using third parties
    • F. Emekçi, D. Agrawal, and A. El Abbadi. Privacy preserving query processing using third parties. In ICDE, 2006.
    • (2006) ICDE
    • Emekçi, F.1    Agrawal, D.2    El Abbadi, A.3
  • 12
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
    • (2009) STOC
    • Gentry, C.1
  • 13
    • 84859966018 scopus 로고    scopus 로고
    • Fully homomorphic encryption with polylog overhead
    • C. Gentry et al. Fully homomorphic encryption with polylog overhead. In EUROCRYPT, 2012.
    • (2012) EUROCRYPT
    • Gentry, C.1
  • 16
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • H. Hacigümüs et al. and B. R. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD, 2002.
    • (2002) SIGMOD
    • Hacigümüs, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 17
    • 85065578926 scopus 로고    scopus 로고
    • A privacy preserving index for range queries
    • B. Hore, S. Mehrotra, and G. Tsudik. A privacy preserving index for range queries. In VLDB, 2004.
    • (2004) VLDB
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 18
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • M. Kantarcioglu and C. Chris. Privacy-preserving distributed mining of association rules on horizontally partitioned data. TKDE, 2004.
    • (2004) TKDE
    • Kantarcioglu, M.1    Chris, C.2
  • 20
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
    • (1999) EUROCRYPT
    • Paillier, P.1
  • 21
    • 79957865770 scopus 로고    scopus 로고
    • Secure and efficient in-network processing of exact sum queries
    • S. Papadopoulos et al. Secure and efficient in-network processing of exact sum queries. In ICDE, 2011.
    • (2011) ICDE
    • Papadopoulos, S.1
  • 22
    • 84865653421 scopus 로고    scopus 로고
    • Cryptdb: Processing queries on an encrypted database
    • R. A. Popa et al. Cryptdb: processing queries on an encrypted database. CACM, 2012.
    • (2012) CACM
    • Popa, R.A.1
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest et al.and A. Shamir and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. CACM, 1978.
    • (1978) CACM
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 24
    • 70049084649 scopus 로고    scopus 로고
    • Automatic virtual machine configuration for database workloads
    • A. Soror et al. Automatic virtual machine configuration for database workloads. In SIGMOD, 2008.
    • (2008) SIGMOD
    • Soror, A.1
  • 25
    • 84881085215 scopus 로고    scopus 로고
    • Processing analytical queries over encrypted data
    • S. Tu and M. F. Kaashoek et al. Processing analytical queries over encrypted data. In PVLDB, 2013.
    • (2013) PVLDB
    • Tu, S.1    Kaashoek, M.F.2
  • 26
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • J. Vaidya et al. Secure set intersection cardinality with application to association rule mining. JCS, 2005.
    • (2005) JCS
    • Vaidya, J.1
  • 27
    • 84904316636 scopus 로고    scopus 로고
    • A comprehensive framework for secure query processing on relational data in the cloud
    • S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In SDM, 2011.
    • (2011) SDM
    • Wang, S.1    Agrawal, D.2    El Abbadi, A.3
  • 28
    • 84880559661 scopus 로고    scopus 로고
    • Parallel analytics as a service
    • P. Wong, Z. He, and E. Lo. Parallel analytics as a service. In SIGMOD, 2013.
    • (2013) SIGMOD
    • Wong, P.1    He, Z.2    Lo, E.3
  • 29
    • 84904325063 scopus 로고    scopus 로고
    • Secure query processing with data interoperability in a cloud database environment
    • Department of Computer Science, University of Hong Kong
    • W. K. Wong et al. Secure query processing with data interoperability in a cloud database environment. Technical Report TR-2014-03, Department of Computer Science, University of Hong Kong, 2014.
    • (2014) Technical Report TR-2014-03
    • Wong, W.K.1
  • 30
    • 0001772530 scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C. Yao. Protocols for secure computations (extended abstract). In FOCS, 1982.
    • (1982) FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.