메뉴 건너뛰기




Volumn , Issue , 2014, Pages 167-174

Protecting access confidentiality with data distribution and swapping

Author keywords

Access confidentiality; Data distribution; Swapping

Indexed keywords

CRYPTOGRAPHY;

EID: 84924389886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BDCloud.2014.59     Document Type: Conference Paper
Times cited : (7)

References (21)
  • 2
    • 84881250193 scopus 로고    scopus 로고
    • ObliviStore: High performance oblivious cloud storage
    • San Francisco, CA, May
    • E. Stefanov and E. Shi, "ObliviStore: High performance oblivious cloud storage," in Proc. of IEEE S&P, San Francisco, CA, May 2013.
    • (2013) Proc. of IEEE S&P
    • Stefanov, E.1    Shi, E.2
  • 4
    • 84899006582 scopus 로고    scopus 로고
    • Inference attack against encrypted range queries on outsourced databases
    • San Antonio, TX, March
    • M. Islam, M. Kuzu, and M. Kantarcioglu, "Inference attack against encrypted range queries on outsourced databases," in Proc. of CODASPY, San Antonio, TX, March 2014.
    • (2014) Proc. of CODASPY
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 5
    • 84878298643 scopus 로고    scopus 로고
    • Enhancing access privacy of range retrievals over b+-trees
    • H. Pang, J. Zhang, and K. Mouratidis, "Enhancing access privacy of range retrievals over B+-trees," IEEE TKDE, vol. 25, no. 7, pp. 1533-1547, 2013.
    • (2013) IEEE TKDE , vol.25 , Issue.7 , pp. 1533-1547
    • Pang, H.1    Zhang, J.2    Mouratidis, K.3
  • 6
    • 77954461010 scopus 로고    scopus 로고
    • Data protection in outsourcing scenarios: Issues and directions
    • Beijing, China, April
    • P. Samarati and S. De Capitani di Vimercati, "Data protection in outsourcing scenarios: Issues and directions," in Proc. of ASIACCS, Beijing, China, April 2010.
    • (2010) Proc. of ASIACCS
    • Samarati, P.1    De Capitani Di Vimercat, S.2
  • 8
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • Paphos, Cyprus, December
    • R. Jhawar, V. Piuri, and P. Samarati, "Supporting security requirements for resource management in cloud computing," in Proc. of CSE, Paphos, Cyprus, December 2012.
    • (2012) Proc. of CSE
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 9
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • Madison, WI, June
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model," in Proc. of SIGMOD, Madison, WI, June 2002.
    • (2002) Proc. of SIGMOD
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 10
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE TPDS, vol. 23, no. 8, pp. 1467-1479, 2012.
    • (2012) IEEE TPDS , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 11
    • 77951205188 scopus 로고    scopus 로고
    • A survey of singledatabase private information retrieval: Techniques and applications
    • Beijing, China, April
    • R. Ostrovsky and W. E. Skeith, III, "A survey of singledatabase private information retrieval: Techniques and applications," in Proc. of PKC, Beijing, China, April 2007.
    • (2007) Proc. of PKC
    • Ostrovsky, R.1    Skeith, W.E.2
  • 12
    • 0001090406 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Prague, Czech Republic, May
    • C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. of EUROCRYPT, Prague, Czech Republic, May 1999.
    • (1999) Proc. of EUROCRYPT
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 13
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Alexandria, VA, October
    • P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in Proc of CCS, Alexandria, VA, October 2008.
    • (2008) Proc of CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 14
    • 84945211829 scopus 로고    scopus 로고
    • The melbourne shuffle: Improving oblivious storage in the cloud
    • Copenhagen, Denmark, July
    • O. Ohrimenko, M. Goodrich, R. Tamassia, and E. Upfal, "The Melbourne Shuffle: Improving oblivious storage in the cloud," in Proc. of ICLAP, Copenhagen, Denmark, July 2014.
    • (2014) Proc. of ICLAP
    • Ohrimenko, O.1    Goodrich, M.2    Tamassia, R.3    Upfal, E.4
  • 15
    • 84910593773 scopus 로고    scopus 로고
    • Distributed oblivious ram for secure two-party computation
    • Japan, March
    • S. Lu and R. Ostrovsky, "Distributed Oblivious RAM for secure two-party computation," in Proc. of TCC, Tokyo, Japan, March 2013.
    • (2013) Proc. of TCC, Tokyo
    • Lu, S.1    Ostrovsky, R.2
  • 16
    • 84889071325 scopus 로고    scopus 로고
    • Multi-cloud oblivious storage
    • Berlin, Germany, November
    • E. Stefanov and E. Shi, "Multi-cloud oblivious storage," in Proc. of ACM CCS, Berlin, Germany, November 2013.
    • (2013) Proc. of ACM CCS
    • Stefanov, E.1    Shi, E.2
  • 17
    • 33646382224 scopus 로고    scopus 로고
    • Hiding traversal of tree structured data from untrusted data stores
    • Porto, Portugal, April
    • P. Lin and K. Candan, "Hiding traversal of tree structured data from untrusted data stores," in Proc. of WOSIS, Porto, Portugal, April 2004.
    • (2004) Proc. of WOSIS
    • Lin, P.1    Candan, K.2
  • 18
    • 80053019963 scopus 로고    scopus 로고
    • A light-weight solution to preservation of access pattern privacy in un-trusted clouds
    • Leuven, Belgium, Sep
    • K. Yang, J. Zhang, W. Zhang, and D. Qiao, "A light-weight solution to preservation of access pattern privacy in un-trusted clouds," in Proc. of ESORICS, Leuven, Belgium, Sep. 2011.
    • (2011) Proc. of ESORICS
    • Yang, K.1    Zhang, J.2    Zhang, W.3    Qiao, D.4
  • 21
    • 34250651882 scopus 로고    scopus 로고
    • Two can keep a secret: A distributed architecture for secure database services
    • Asilomar, CA, January
    • G. Aggarwal et al., "Two can keep a secret: A distributed architecture for secure database services," in Proc. of CIDR, Asilomar, CA, January 2005.
    • (2005) Proc. of CIDR
    • Aggarwal, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.