Cumulus4j: A Provably Secure Database Abstraction Layer

Cloud Computing has huge impact on IT systems. It offers advantages like flexibility and reduced costs. Privacy and security issues, however, remain a major drawback. While data can be secured against external threats using standard techniques, service providers themselves have to be trusted to ensure privacy.

[1]  Chris Clifton,et al.  Security Issues in Querying Encrypted Data , 2005, DBSec.

[2]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[3]  Ashwin Machanavajjhala,et al.  No free lunch in data privacy , 2011, SIGMOD '11.

[4]  Chris Clifton,et al.  Query Processing in Private Data Outsourcing Using Anonymization , 2011, DBSec.

[5]  Sushil Jajodia,et al.  Fragments and loose associations , 2010, Proc. VLDB Endow..

[6]  Sushil Jajodia,et al.  Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.

[7]  Yingjiu Li,et al.  Data and Applications Security and Privacy XXV , 2011 .

[8]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[9]  Rajeev Motwani,et al.  Two Can Keep A Secret: A Distributed Architecture for Secure Database Services , 2005, CIDR.

[10]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[11]  Rasool Jalili,et al.  k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing , 2012, DBSec.

[12]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[13]  Heiko Böck,et al.  Java Persistence API , 2012 .

[14]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[15]  Yufei Tao,et al.  Anatomy: simple and effective privacy preservation , 2006, VLDB.

[16]  Nora Cuppens-Boulahia,et al.  Data and Applications Security and Privacy XXVI , 2012, Lecture Notes in Computer Science.

[17]  Matthias Huber,et al.  Towards secure cloud computing through a separation of duties , 2011, GI-Jahrestagung.