PRAMOD: A Privacy-Preserving Framework for Supporting Efficient and Secure Database-as-a-Service
暂无分享,去创建一个
Beng Chin Ooi | Hung Dang | Ee-Chien Chang | Prateek Saxena | Shruti Tople | Tien Tuan Anh Dinh | P. Saxena | B. Ooi | Hung Dang | E. Chang | Shruti Tople
[1] Beng Chin Ooi,et al. M2R: Enabling Stronger Privacy in MapReduce Computation , 2015, USENIX Security Symposium.
[2] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[3] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[4] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[5] David Thomas,et al. The Art in Computer Programming , 2001 .
[6] Eli Upfal,et al. The Melbourne Shuffle: Improving Oblivious Storage in the Cloud , 2014, ICALP.
[7] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[8] Charles V. Wright,et al. Inference Attacks on Property-Preserving Encrypted Databases , 2015, CCS.
[9] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[10] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[11] Michael T. Goodrich,et al. Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time , 2014, STOC.
[12] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[13] Michael T. Goodrich,et al. Data-Oblivious Graph Drawing Model and Algorithms , 2012, ArXiv.
[14] Joann J. Ordille,et al. Data integration: the teenage years , 2006, VLDB.
[15] Raghav Kaushik,et al. Oblivious Query Processing , 2013, ICDT.
[16] Dan Boneh,et al. Remote Oblivious Storage: Making Oblivious RAM Practical , 2011 .
[17] Adrian Perrig,et al. TrustVisor: Efficient TCB Reduction and Attestation , 2010, 2010 IEEE Symposium on Security and Privacy.
[18] Christos Gkantsidis,et al. Observing and Preventing Leakage in MapReduce , 2015, CCS.
[19] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[20] Ramarathnam Venkatesan,et al. Orthogonal Security with Cipherbase , 2013, CIDR.
[21] Prashant Malik,et al. Cassandra: a decentralized structured storage system , 2010, OPSR.
[22] Marina Blanton,et al. Data-oblivious graph algorithms for secure computation and outsourcing , 2013, ASIA CCS '13.
[23] Radu Sion,et al. On securing untrusted clouds with cryptography , 2010, WPES '10.
[24] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[25] Donald E. Knuth,et al. The art of computer programming: sorting and searching (volume 3) , 1973 .
[26] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[27] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[28] Michael T. Goodrich,et al. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data , 2011, SPAA '11.
[29] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[30] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[31] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[32] Ron Goldman,et al. Poisson approximation , 2000, Proceedings Geometric Modeling and Processing 2000. Theory and Applications.
[33] Bettina Kemme,et al. Compaction Management in Distributed Key-Value Datastores , 2015, Proc. VLDB Endow..
[34] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[35] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[36] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[37] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[38] Mikhail Bautin,et al. Storage Infrastructure Behind Facebook Messages: Using HBase at Scale , 2012, IEEE Data Eng. Bull..
[39] Neoklis Polyzotis,et al. Private Database Synthesis for Outsourced System Evaluation , 2011, AMW.
[40] Christos Gkantsidis,et al. VC 3 : Trustworthy Data Analytics in the Cloud , 2014 .
[41] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[42] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[43] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.