메뉴 건너뛰기




Volumn 8604, Issue , 2014, Pages 212-243

Encryption and fragmentation for data confidentiality in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA HANDLING; SECURITY SYSTEMS;

EID: 84927665746     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Chapter
Times cited : (29)

References (36)
  • 3
    • 84863769012 scopus 로고    scopus 로고
    • Querying schemas with access restrictions
    • Benedikt, M., Bourhis, P., Ley, C.: Querying schemas with access restrictions. Proc. of VLDB Endowment 5(7), 634-645 (2012)
    • (2012) Proc. Of VLDB Endowment , vol.5 , Issue.7 , pp. 634-645
    • Benedikt, M.1    Bourhis, P.2    Ley, C.3
  • 4
    • 80054794829 scopus 로고    scopus 로고
    • On the inference-proofness of database fragmentation satisfying confidentiality constraints
    • In: Lai, X., Zhou, J., Li, H. (eds.), Springer, Heidelberg
    • Biskup, J., Preus, M., Wiese, L.: On the inference-proofness of database fragmentation satisfying confidentiality constraints. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 246-261. Springer, Heidelberg (2011)
    • (2011) ISC 2011. LNCS , vol.7001 , pp. 246-261
    • Biskup, J.1    Preus, M.2    Wiese, L.3
  • 6
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), Springer, Heidelberg
    • Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
    • (2005) ACNS 2005. LNCS , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 7
    • 38049032965 scopus 로고    scopus 로고
    • Fragmentation and encryption to enforce privacy in data storage
    • i, S., Samarati, P.: Fragmentatio, torage. In: Biskup
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., L´opez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171-186. Springer, Heidelberg (2007)
    • (2004) And Encryption to Enforce Pr , pp. 171-186
    • Ciriani, V.1
  • 9
    • 70350355128 scopus 로고    scopus 로고
    • Keep a few: Outsourcing data while maintaining confidentiality
    • In: Backes, M., Ning, P. (eds.), Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
    • (2009) ESORICS 2009. LNCS , vol.5789 , pp. 440-455
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 12
    • 84872227035 scopus 로고    scopus 로고
    • An OBDD approach to enforce confidentiality and visibility constraints in data publishing
    • Ciriani, V., DeCapitani diVimercati, S., Foresti, S., Livraga, G., Samarati, P.: An OBDD approach to enforce confidentiality and visibility constraints in data publishing. JCS 20(5), 463-508 (2012)
    • (2012) JCS , vol.20 , Issue.5 , pp. 463-508
    • Ciriani, V.1    Decapitani Divimercati, S.2    Foresti, S.3    Livraga, G.4    Samarati, P.5
  • 13
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Alexandria, VA, USA (October-November
    • Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proc. of CCS 2006, Alexandria, VA, USA (October-November 2006)
    • (2006) Proc. Of CCS 2006
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 20
    • 84872068962 scopus 로고    scopus 로고
    • Managing and accessing data in the cloud: Privacy risks and approaches
    • Cork, IrelandOctober
    • De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: Proc. of CRiSIS 2012, Cork, Ireland (October 2012)
    • (2012) Proc. Of Crisis 2012
    • De Capitani Di Vimercati, S.1    Foresti, S.2    Samarati, P.3
  • 22
    • 84929936983 scopus 로고    scopus 로고
    • Selective and fine-grained access to data in the cloud
    • Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.), Springer
    • De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. Springer (2014)
    • (2014) Secure Cloud Computing
    • De Capitani Di Vimercati, S.1    Foresti, S.2    Samarati, P.3
  • 24
    • 77954592905 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Bethesda, MA, USAMay
    • Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC 2009, Bethesda, MA, USA (May 2009)
    • (2009) Proc. Of STOC 2009
    • Gentry, C.1
  • 25
    • 85025833636 scopus 로고    scopus 로고
    • Goh, E.J.: Secure indexes. Tech. Rep. 2003/216, Cryptology ePrint Archive (2003)
    • Goh, E.J.: Secure indexes. Tech. Rep. 2003/216, Cryptology ePrint Archive (2003), http://eprint.iacr.org?
  • 27
    • 33745623486 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.), Springer, Heidelberg
    • Hacıgümüş, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125-136. Springer, Heidelberg (2004)
    • (2004) DASFAA 2004. LNCS , vol.2973 , pp. 125-136
    • Hacıgümüş, H.1    Iyer, B.2    Mehrotra, S.3
  • 28
    • 85088717937 scopus 로고    scopus 로고
    • Fault tolerance management in IaaS clouds
    • Rome, Italy, October
    • Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proc. of ESTEL 2012, Rome, Italy (October 2012)
    • (2012) Proc. Of ESTEL 2012
    • Jhawar, R.1    Piuri, V.2
  • 29
    • 84883954888 scopus 로고    scopus 로고
    • Fault tolerance and resilience in cloud computing environments
    • Vacca, J. (ed.), 2nd edn, Morgan Kaufmann
    • Jhawar, R., Piuri, V.: Fault tolerance and resilience in cloud computing environments. In: Vacca, J. (ed.) Computer and Information Security Handbook, 2nd edn., pp. 125-141. Morgan Kaufmann (2013)
    • (2013) Computer and Information Security Handbook , pp. 125-141
    • Jhawar, R.1    Piuri, V.2
  • 30
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • Paphos, CyprusDecember
    • Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012, Paphos, Cyprus (December 2012)
    • (2012) Proc. Of CSE 2012
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 32
    • 84901660441 scopus 로고    scopus 로고
    • Data security and privacy in the cloud
    • In: Huang, X., Zhou, J. (eds.), Springer, Heidelberg
    • Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28-41. Springer, Heidelberg (2014)
    • (2014) ISPEC 2014. LNCS , vol.8434 , pp. 28-41
    • Samarati, P.1
  • 34
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS 23(8), 1467-1479 (2012)
    • (2012) IEEE TPDS , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 35
    • 77749250556 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted XML databases
    • Seoul, Korea, September
    • Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of VLDB 2006, Seoul, Korea (September 2006)
    • (2006) Proc. Of VLDB 2006
    • Wang, H.1    Lakshmanan, L.2
  • 36
    • 84873879352 scopus 로고    scopus 로고
    • Securing the Cloud: Cloud Computer Security Techniques and Tactics
    • Winkler, V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress (2011)
    • (2011) Syngress
    • Winkler, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.