Secure query processing with data interoperability in a cloud database environment
暂无分享,去创建一个
Siu-Ming Yiu | David Wai-Lok Cheung | Wai Kit Wong | Ben Kao | Rongbin Li | D. Cheung | B. Kao | S. Yiu | W. Wong | Rongbin Li
[1] Amr El Abbadi,et al. ElasTraS: An Elastic Transactional Data Store in the Cloud , 2009, HotCloud.
[2] Gustavo Alonso,et al. Consistency Rationing in the Cloud: Pay only when it matters , 2009, Proc. VLDB Endow..
[3] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[4] Aggelos Kiayias,et al. Secure and efficient in-network processing of exact SUM queries , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[5] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[8] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[9] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[10] B. E. Eckbo,et al. Appendix , 1826, Epilepsy Research.
[11] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[12] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[13] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[14] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[17] Divyakant Agrawal,et al. Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration , 2011, Proc. VLDB Endow..
[18] Divyakant Agrawal,et al. Zephyr: live migration in shared nothing databases for elastic cloud platforms , 2011, SIGMOD '11.
[19] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[20] KantarciogluMurat,et al. Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data , 2004 .
[21] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[22] Carlo Curino,et al. Relational Cloud: a Database Service for the cloud , 2011, CIDR.
[23] Divyakant Agrawal,et al. A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud , 2011, Secure Data Management.
[24] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[25] Eric Lo,et al. Parallel analytics as a service , 2013, SIGMOD '13.
[26] Ashraf Aboulnaga,et al. Automatic virtual machine configuration for database workloads , 2008, SIGMOD Conference.
[27] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[28] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[29] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[30] Ramarathnam Venkatesan,et al. Secure database-as-a-service with Cipherbase , 2013, SIGMOD '13.
[31] Divyakant Agrawal,et al. Privacy Preserving Query Processing Using Third Parties , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[32] Carlo Curino,et al. Workload-aware database monitoring and consolidation , 2011, SIGMOD '11.
[33] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[34] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[35] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[36] Dan Bogdanov,et al. A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining , 2012, PAISI.
[37] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[38] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[39] LiFeng,et al. CPU sharing techniques for performance isolation in multi-tenant relational database-as-a-service , 2013, VLDB 2013.
[40] Chris Clifton,et al. Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..