메뉴 건너뛰기




Volumn 24, Issue 3, 2016, Pages 347-378

Efficient integrity checks for join queries in the cloud

Author keywords

distributed join; Query integrity; semi join execution; verification object

Indexed keywords

DATABASE SYSTEMS; SECURITY OF DATA;

EID: 84973469466     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-160545     Document Type: Article
Times cited : (17)

References (34)
  • 2
    • 84897731945 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering on the cloud and practical implementation experiences
    • Santa Clara, CA
    • A. Basu, J. Vaidya, H. Kikuchi and T. Dimitrakos, Privacy-preserving collaborative filtering on the cloud and practical implementation experiences, in: Proc. of IEEE Cloud, Santa Clara, CA, 2013.
    • (2013) Proc. of IEEE Cloud
    • Basu, A.1    Vaidya, J.2    Kikuchi, H.3    Dimitrakos, T.4
  • 10
    • 84872068962 scopus 로고    scopus 로고
    • Managing and accessing data in the cloud: Privacy risks and approaches
    • Cork, Ireland
    • S. De Capitani di Vimercati, S. Foresti and P. Samarati, Managing and accessing data in the cloud: Privacy risks and approaches, in: Proc. of CRiSIS, Cork, Ireland, 2012.
    • (2012) Proc. of CRiSIS
    • De Capitani Di Vimercati, S.1    Foresti, S.2    Samarati, P.3
  • 11
    • 84894156359 scopus 로고    scopus 로고
    • Robust lossless watermarking of relational databases based on circular histogram modulation
    • J. Franco-Contreras, G. Coatrieux, F. Cuppens, N. Cuppens-Boulahia and C. Roux, Robust lossless watermarking of relational databases based on circular histogram modulation, IEEE TIFS 9(3) (2014), 397-410.
    • (2014) IEEE TIFS , vol.9 , Issue.3 , pp. 397-410
    • Franco-Contreras, J.1    Coatrieux, G.2    Cuppens, F.3    Cuppens-Boulahia, N.4    Roux, C.5
  • 12
    • 84888018311 scopus 로고    scopus 로고
    • Data integrity evaluation in cloud database-as-a-service
    • Santa Clara, CA
    • P. Ghazizadeh, R. Mukkamala and S. Olariu, Data integrity evaluation in cloud database-as-a-service, in: Proc. of IEEE SERVICES, Santa Clara, CA, 2013.
    • (2013) Proc. of IEEE SERVICES
    • Ghazizadeh, P.1    Mukkamala, R.2    Olariu, S.3
  • 13
    • 84967222929 scopus 로고    scopus 로고
    • Ensuring integrity of encrypted databases in database as a service model
    • Estes Park, CO
    • H. Hacigümüs, B. Iyer and S. Mehrotra, Ensuring integrity of encrypted databases in database as a service model, in: Proc. of DBSec, Estes Park, CO, 2003.
    • (2003) Proc. of DBSec
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3
  • 14
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, WI
    • H. Hacigümüş, B. Iyer, S.Mehrotra and C. Li, Executing SQL over encrypted data in the database-service-provider model, in: Proc. of SIGMOD, Madison, WI, 2002.
    • (2002) Proc. of SIGMOD
    • Hacigümüş, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 15
    • 85088717937 scopus 로고    scopus 로고
    • Fault tolerance management in IaaS clouds
    • Rome, Italy
    • R. Jhawar and V. Piuri, Fault tolerance management in IaaS clouds, in: Proc. of ESTEL, Rome, Italy, 2012.
    • (2012) Proc. of ESTEL
    • Jhawar, R.1    Piuri, V.2
  • 16
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • Paphos, Cyprus
    • R. Jhawar, V. Piuri and P. Samarati, Supporting security requirements for resource management in cloud computing, in: Proc. of CSE, Paphos, Cyprus, 2012.
    • (2012) Proc. of CSE
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 17
    • 84876800484 scopus 로고    scopus 로고
    • Fault tolerance management in cloud computing: A system-level perspective
    • R. Jhawar, V. Piuri and M. Santambrogio, Fault tolerance management in cloud computing: A system-level perspective, IEEE Systems Journal 7(2) (2013), 288-297.
    • (2013) IEEE Systems Journal , vol.7 , Issue.2 , pp. 288-297
    • Jhawar, R.1    Piuri, V.2    Santambrogio, M.3
  • 18
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • Alexandria, VA
    • A. Juels and B.S. Kaliski Jr., PORs: Proofs of retrievability for large files, in: Proc. of ACM CCS, Alexandria, VA, 2007.
    • (2007) Proc. of ACM CCS
    • Juels, A.1    Kaliski, B.S.2
  • 19
    • 77954696736 scopus 로고    scopus 로고
    • An evaluation of alternative architectures for transaction processing in the cloud
    • Indianapolis, IN
    • D. Kossmann, T. Kraska and S. Loesing, An evaluation of alternative architectures for transaction processing in the cloud, in: Proc. of SIGMOD, Indianapolis, IN, 2010.
    • (2010) Proc. of SIGMOD
    • Kossmann, D.1    Kraska, T.2    Loesing, S.3
  • 20
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Chicago, IL
    • F. Li, M. Hadjieleftheriou, G. Kollios and L. Reyzin, Dynamic authenticated index structures for outsourced databases, in: Proc. of SIGMOD, Chicago, IL, 2006.
    • (2006) Proc. of SIGMOD
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 21
    • 78651408225 scopus 로고    scopus 로고
    • Authenticated index structures for aggregation queries
    • F. Li,M. Hadjieleftheriou, G. Kollios and L. Reyzin, Authenticated index structures for aggregation queries, ACM TISSEC 13(4) (2010), 32:1-32:35.
    • (2010) ACM TISSEC , vol.13 , Issue.4 , pp. 321-3235
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 22
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • E. Mykletun, M. Narasimha and G. Tsudik, Authentication and integrity in outsourced databases, ACM TOS 2(2) (2006), 107-138.
    • (2006) ACM TOS , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 23
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • Baltimore, MA
    • H. Pang, A. Jain, K. Ramamritham and K. Tan, Verifying completeness of relational query results in data publishing, in: Proc. of SIGMOD, Baltimore, MA, 2005.
    • (2005) Proc. of SIGMOD
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.4
  • 24
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • K. Ren, C. Wang and Q. Wang, Security challenges for the public cloud, IEEE Internet Computing 16(1) (2012), 69-73.
    • (2012) IEEE Internet Computing , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 26
    • 84878517199 scopus 로고    scopus 로고
    • Verifying correctness of inner product of vectors in cloud computing
    • Hangzhou, China
    • G. Sheng, T. Wen, Q. Guo and Y. Yin, Verifying correctness of inner product of vectors in cloud computing, in: Proc. of Cloud Computing, Hangzhou, China, 2013.
    • (2013) Proc. of Cloud Computing
    • Sheng, G.1    Wen, T.2    Guo, Q.3    Yin, Y.4
  • 27
    • 84973476005 scopus 로고    scopus 로고
    • The transaction processing performance council (TPC) benchmark H
    • The transaction processing performance council (TPC) benchmark H, available at: http://www.tpc.org/tpch/.
  • 28
    • 84973472074 scopus 로고    scopus 로고
    • Correctness verification in outsourced databases: More reliable fake tuples approach
    • Kolkata, India, December
    • G. Umadevi and A. Saxena, Correctness verification in outsourced databases: More reliable fake tuples approach, in: Proc. of ICISS, Kolkata, India, December, 2013.
    • (2013) Proc. of ICISS
    • Umadevi, G.1    Saxena, A.2
  • 29
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • C. Wang, S. Chow, Q. Wang, K. Ren and W. Lou, Privacy-preserving public auditing for secure cloud storage, IEEE Transactions on Computers 62(2) (2013), 362-375.
    • (2013) IEEE Transactions on Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 30
    • 70349251911 scopus 로고    scopus 로고
    • Dual encryption for query integrity assurance
    • Napa Valley, CA
    • H. Wang, J. Yin, C. Perng and P.S. Yu, Dual encryption for query integrity assurance, in: Proc. of CIKM, Napa Valley, CA, 2008.
    • (2008) Proc. of CIKM
    • Wang, H.1    Yin, J.2    Perng, C.3    Yu, P.S.4
  • 31
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • Vienna, Austria
    • M. Xie, H. Wang, J. Yin and X. Meng, Integrity auditing of outsourced data, in: Proc. of VLDB, Vienna, Austria, 2007.
    • (2007) Proc. of VLDB
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 32
    • 43349091759 scopus 로고    scopus 로고
    • Providing freshness guarantees for outsourced databases
    • Nantes, France
    • M. Xie, H. Wang, J. Yin and X. Meng, Providing freshness guarantees for outsourced databases, in: Proc. of EDBT, Nantes, France, 2008.
    • (2008) Proc. of EDBT
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 33
    • 84881101092 scopus 로고    scopus 로고
    • Authentication of range query results in MapReduce environments
    • Glasgow, UK
    • Z. Yang, S. Gao, J. Xu and B. Choi, Authentication of range query results in MapReduce environments, in: Proc. of CloudDB, Glasgow, UK, 2011.
    • (2011) Proc. of CloudDB
    • Yang, Z.1    Gao, S.2    Xu, J.3    Choi, B.4
  • 34
    • 84878830854 scopus 로고    scopus 로고
    • Dynamic audit services for outsourced storages in clouds
    • Y. Zhu, G.-J. Ahn, H. Hu, S.S. Yau, H.G. An and C.-J. Hu, Dynamic audit services for outsourced storages in clouds, IEEE TSC 6(2) (2013), 227-238.
    • (2013) IEEE TSC , vol.6 , Issue.2 , pp. 227-238
    • Zhu, Y.1    Ahn, G.-J.2    Hu, H.3    Yau, S.S.4    An, H.G.5    Hu, C.-J.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.