Inference attack against encrypted range queries on outsourced databases
暂无分享,去创建一个
Murat Kantarcioglu | Mohammad Saiful Islam | Mehmet Kuzu | Murat Kantarcioglu | M. S. Islam | Mehmet Kuzu
[1] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[2] Jinsheng Zhang,et al. A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds , 2011, ESORICS.
[3] Gerardo Pelosi,et al. Efficient and Private Access to Outsourced Data , 2011, 2011 31st International Conference on Distributed Computing Systems.
[4] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[5] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[7] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[8] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[9] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Gene Tsudik,et al. Aggregation Queries in the Database-As-a-Service Model , 2006, DBSec.
[11] Chinya V. Ravishankar,et al. Compromising privacy in precise query protocols , 2013, EDBT '13.
[12] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[13] Chris Clifton,et al. Security Issues in Querying Encrypted Data , 2005, DBSec.
[14] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[15] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[16] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[17] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[18] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[19] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[20] Sheng Zhong,et al. Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.
[21] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[22] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[23] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[24] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[25] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.