Parallel query execution over encrypted data in database-as-a-service (DaaS)
暂无分享,去创建一个
Awais Ahmad | Muhammad Ahsan Latif | Shahzad Sarwar | Muhammad Shahid | Mudassar Ahmad | Muhammad Asif Habib | Junaid Chaudhry | Saadat Hanif Dar
[1] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[2] T. William Olle. Database management system (DBMS) , 2003 .
[3] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] Igor Cialenco,et al. Asymptotic Properties of the Maximum Likelihood Estimator for Stochastic Parabolic Equations with Additive Fractional Brownian Motion , 2008, 0804.0407.
[5] Gene Tsudik,et al. Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.
[6] Charles F. Webb. IBM z10: The Next-Generation Mainframe Microprocessor , 2008, IEEE Micro.
[7] Jing Xu,et al. QScheduler: A Tool for Parallel Query Processing in Database Systems , 2014, 2014 19th International Conference on Engineering of Complex Computer Systems.
[8] S. Sumathi,et al. Structured Query Language , 2007 .
[9] Panu Hämäläinen,et al. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[10] Ramesh Karri,et al. Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard , 2004 .
[11] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[12] Zhenlong Li,et al. Big Data and cloud computing: innovation opportunities and challenges , 2017, Int. J. Digit. Earth.
[13] Hakan Hacigümüs,et al. Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.
[14] Zongkai Yang,et al. A secure database encryption scheme , 2005, CCNC.
[15] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[16] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[17] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[18] Hieu Minh Nguyen,et al. Speed up Querying Encrypted Data on Outsourced Database , 2017, ICMLSC.
[19] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[20] Erez Zadok,et al. Ensuring data integrity in storage: techniques and applications , 2005, StorageSS '05.
[21] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[22] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[23] Eric Pardede,et al. Using Multi Shares for Ensuring Privacy in Database-as-a-Service , 2011, 2011 44th Hawaii International Conference on System Sciences.
[24] Li Yuan-xiang. Data encryption based on multi-granularity reversible cellular automata , 2010 .
[25] Patrick Valduriez,et al. Top-k Query Processing Over Outsourced Encrypted Data , 2017 .
[26] Yin-Fu Huang,et al. Parallel Query on the In-Memory Database in a CUDA Platform , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).
[27] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[28] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[29] Hakan Hacigümüs,et al. Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.
[30] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[31] Hari Balakrishnan,et al. CryptDB: A Practical Encrypted Relational DBMS , 2011 .
[32] R. K. Bunkar,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2014 .
[33] Davide Martinenghi,et al. Advanced Techniques for Efficient Data Integrity Checking , 2005 .
[34] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[35] Divyakant Agrawal,et al. Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[36] Patrick Valduriez,et al. Top-k Query Processing over Distributed Sensitive Data , 2018, IDEAS.
[37] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[38] Lars Hoffmann,et al. Differential Fault Analysis on the SHA1 Compression Function , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[39] Carlo Curino,et al. Relational Cloud: a Database Service for the cloud , 2011, CIDR.
[40] Ciprian Dobre,et al. Big Data and Cloud Computing: A Survey of the State-of-the-Art and Research Challenges , 2017 .
[41] David W. Chadwick,et al. Guest editorial: A brief overview of data leakage and insider threats , 2013, Inf. Syst. Frontiers.
[42] Mininath R. Bendre,et al. Analytics, challenges and applications in big data environment: a survey , 2016 .