Database management as a service: Challenges and opportunities
Data outsourcing or database as a service is a new paradigm for data management in which
a third party service provider hosts a database as a service. The service provides data …
a third party service provider hosts a database as a service. The service provides data …
Database encryption: an overview of contemporary challenges and design considerations
This article describes the major challenges and design considerations pertaining to
database encryption. The article first presents an attack model and the main relevant …
database encryption. The article first presents an attack model and the main relevant …
Encryption policies for regulating access to outsourced data
Current access control models typically assume that resources are under the strict custody of
a trusted party which monitors each access request to verify if it is compliant with the …
a trusted party which monitors each access request to verify if it is compliant with the …
[PDF][PDF] 数据库服务——安全与隐私保护
田秀霞, 王晓玲, 高明, 周傲英 - 软件学报, 2010 - jos.org.cn
主要从数据的机密性, 数据的完整性, 数据的完备性, 查询隐私保护以及访问控制策略这5
个关键技术, 综述国际上在数据库服务——安全与隐私保护方面的研究进展 …
个关键技术, 综述国际上在数据库服务——安全与隐私保护方面的研究进展 …
A comprehensive framework for secure query processing on relational data in the cloud
S Wang, D Agrawal, A El Abbadi - … 8th VLDB Workshop, SDM 2011, Seattle …, 2011 - Springer
Data security in the cloud is a big concern that blocks the widespread use of the cloud for
relational data management. First, to ensure data security, data confidentiality needs to be …
relational data management. First, to ensure data security, data confidentiality needs to be …
Implementing a database encryption solution, design and implementation issues
In this paper, we analyze and compare five traditional architectures for database encryption.
We show that existing architectures may provide a high level of security, but have a …
We show that existing architectures may provide a high level of security, but have a …
Conjunctive search in encrypted data
CD Cash, S Jarecki, CS Jutla, HM Krawczyk… - US Patent …, 2017 - Google Patents
A method comprises receiving a first cryptographic token for one search term and a second
cryptographic token is generated using the one search term and at least another search …
cryptographic token is generated using the one search term and at least another search …
Shuffle index: Efficient and private access to outsourced data
Data outsourcing and cloud computing have been emerging at an ever-growing rate as
successful approaches for allowing users and companies to rely on external services for …
successful approaches for allowing users and companies to rely on external services for …
An efficient secure system for fetching data from the outsourced encrypted databases
Recently, database users have begun to use cloud database services to outsource their
databases. The reason for this is the high computation speed and the huge storage capacity …
databases. The reason for this is the high computation speed and the huge storage capacity …
Panda: Partitioned data security on outsourced sensitive and non-sensitive data
Despite extensive research on cryptography, secure and efficient query processing over
outsourced data remains an open challenge. This article continues along with the emerging …
outsourced data remains an open challenge. This article continues along with the emerging …