메뉴 건너뛰기




Volumn 8712 LNCS, Issue PART 1, 2014, Pages 400-418

Privacy-preserving complex query evaluation over semantically secure encrypted data

Author keywords

cloud computing; complex Query; encryption; privacy

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; QUERY PROCESSING; SECURITY SYSTEMS;

EID: 84906500207     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11203-9_23     Document Type: Conference Paper
Times cited : (30)

References (35)
  • 1
    • 79959972183 scopus 로고    scopus 로고
    • Trusteddb: A trusted hardware based database with privacy and data confidentiality
    • Bajaj, S., Sion, R.: Trusteddb: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD, pp. 205-216 (2011)
    • (2011) ACM SIGMOD , pp. 205-216
    • Bajaj, S.1    Sion, R.2
  • 2
    • 3142716056 scopus 로고    scopus 로고
    • Order preserving encryption for numeric data
    • Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: ACM SIGMOD, pp. 563-574 (2004)
    • (2004) ACM SIGMOD , pp. 563-574
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 3
    • 33746748166 scopus 로고    scopus 로고
    • Aggregation queries in the database-as-A-service model
    • In: Damiani, E., Liu, P. (eds.) Springer, Heidelberg
    • Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a- service model. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol. 4127, pp. 89-103. Springer, Heidelberg (2006)
    • (2006) Data and Applications Security 2006. LNCS , vol.4127 , pp. 89-103
    • Mykletun, E.1    Tsudik, G.2
  • 5
    • 84991010622 scopus 로고    scopus 로고
    • Anti-tamper databases: Processing aggregate queries over encrypted databases
    • Chung, S., Ozsoyoglu, S., Anti-tamper, G.: Anti-tamper databases: Processing aggregate queries over encrypted databases. In: ICDE Workshops, p. 98 (2006)
    • (2006) ICDE Workshops , pp. 98
    • Chung, S.1    Ozsoyoglu, S.2    Anti-Tamper, G.3
  • 6
    • 67650690965 scopus 로고    scopus 로고
    • Order-preserving symmetric encryption
    • In: Joux, A. (ed.) Springer, Heidelberg
    • Boldyreva, A., Chenette, N., Lee, Y., O'Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224-241. Springer, Heidelberg (2009)
    • (2009) Eurocrypt 2009. LNCS , vol.5479 , pp. 224-241
    • Boldyreva, A.1    Chenette, N.2    Lee, Y.3    O'neill, A.4
  • 7
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • Hore, B.,Mehrotra, S., Canim,M., Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. The VLDB Journal 21(3), 333-358 (2012)
    • (2012) The VLDB Journal , vol.21 , Issue.3 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 8
    • 84897723581 scopus 로고    scopus 로고
    • Efficient privacy-preserving range queries over encrypted data in cloud computing
    • Samanthula, B.K., Jiang, W.: Efficient privacy-preserving range queries over encrypted data in cloud computing. In: IEEE CLOUD, pp. 51-58 (2013)
    • (2013) IEEE CLOUD , pp. 51-58
    • Samanthula, B.K.1    Jiang, W.2
  • 9
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • ACM
    • Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: CCS, pp. 139-148. ACM (2008)
    • (2008) CCS , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 11
    • 85179556059 scopus 로고    scopus 로고
    • Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
    • Islam, M., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: NDSS (2012)
    • (2012) NDSS
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 12
    • 26444553177 scopus 로고    scopus 로고
    • Encryption schemes
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Encryption Schemes. In: The Foundations of Cryptography, vol. 2, pp. 373-470. Cambridge University Press, Cambridge (2004)
    • (2004) The Foundations of Cryptography , vol.2 , pp. 373-470
    • Goldreich, O.1
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • In: Stern, J. (ed.) Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
    • (1999) Eurocrypt 1999. LNCS , vol.1592 , pp. 223
    • Paillier, P.1
  • 15
    • 33645593031 scopus 로고    scopus 로고
    • General cryptographic protocols
    • Cambridge University Press, Cambridge
    • Goldreich, O.: General Cryptographic Protocols. In: The Foundations of Cryptography, vol. 2, pp. 599-746. Cambridge University Press, Cambridge (2004)
    • (2004) The Foundations of Cryptography , vol.2 , pp. 599-746
    • Goldreich, O.1
  • 16
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • In: Vadhan, S.P. (ed.) Springer, Heidelberg
    • Boneh, D.,Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
    • (2007) TCC 2007. LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 17
    • 33745623486 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • In: Lee, Y., Li, J.,Whang, K.-Y., Lee, D. (eds.) Springer, Heidelberg
    • Hac?gumus, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J.,Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125-136. Springer, Heidelberg (2004)
    • (2004) DASFAA 2004. LNCS , vol.2973 , pp. 125-136
    • Hacgumus, H.1    Iyer, B.2    Mehrotra, S.3
  • 18
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Springer, Heidelberg
    • Golle, P., Staddon, J.,Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
    • (2004) ACNS 2004. LNCS , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 19
    • 82655162816 scopus 로고    scopus 로고
    • Cryptdb: Protecting confidentiality with encrypted query processing
    • ACM
    • Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: SOSP, pp. 85-100. ACM (2011)
    • (2011) SOSP , pp. 85-100
    • Popa, R.A.1    Redfield, C.M.S.2    Zeldovich, N.3    Balakrishnan, H.4
  • 20
    • 82955173838 scopus 로고    scopus 로고
    • Oblivious RAM with o((logn)3) worst-case cost
    • In: Lee, D.H.,Wang, X. (eds.) Springer, Heidelberg
    • Shi, E., Chan, T.-H.H., Stefanov, E., Li,M.: Oblivious RAM with o((logn)3) worst-case cost. In: Lee, D.H.,Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197-214. Springer, Heidelberg (2011)
    • (2011) ASIACRYPT 2011. LNCS , vol.7073 , pp. 197-214
    • Shi, E.1    Chan, T.-H.H.2    Stefanov, E.3    Li, M.4
  • 21
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • ACM
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178. ACM (2009)
    • (2009) STOC , pp. 169-178
    • Gentry, C.1
  • 23
    • 79957974657 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomorphic encryption scheme
    • In: Paterson, K.G. (ed.) Springer, Heidelberg
    • Gentry, C., Halevi, S.: Implementing gentry's fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129-148. Springer, Heidelberg (2011)
    • (2011) Eurocrypt 2011. LNCS , vol.6632 , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 24
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE Computer Society
    • Yao, A.C.: Protocols for secure computations. In: SFCS, pp. 160-164. IEEE Computer Society (1982)
    • (1982) SFCS , pp. 160-164
    • Yao, A.C.1
  • 25
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE Computer Society
    • Yao, A.C.: How to generate and exchange secrets. In: SFCS, pp. 162-167. IEEE Computer Society (1986)
    • (1986) SFCS , pp. 162-167
    • Yao, A.C.1
  • 26
    • 0023545076 scopus 로고
    • How to play any mental game-A completeness theorem for protocols with honest majority
    • ACM
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM (1987)
    • (1987) STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 27
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • ACM
    • Chaum, D., Crepeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: STOC, pp. 11-19. ACM (1988)
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 32
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for paillier encrypted values
    • In: Vaudenay, S. (ed.) Springer, Heidelberg
    • Schoenmakers, B., Tuyls, P.: Efficient binary conversion for paillier encrypted values. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 522-537. Springer, Heidelberg (2006)
    • (2006) Eurocrypt 2006. LNCS , vol.4004 , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 33
    • 84877991754 scopus 로고    scopus 로고
    • An efficient and probabilistic secure bit-decomposition
    • Samanthula, B.K., Jiang, W.: An efficient and probabilistic secure bit-decomposition. In: ACM ASIACCS, pp. 541-546 (2013)
    • (2013) ACM ASIACCS , pp. 541-546
    • Samanthula, B.K.1    Jiang, W.2
  • 35
    • 71549170830 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • In: Garay, J.A.,Miyaji, A., Otsuka, A. (eds.) Springer, Heidelberg
    • Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A.,Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
    • (2009) CANS 2009. LNCS , vol.5888 , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.