Scattered simultaneous and autonomous access to scrambled cloud databases
Abstract
Keywords
References
Homomorphic Encryption Using Ideal Lattices,‖ Proc. 41st Ann. ACM Symp. Theory of Computing, May 2009.
R.A. Popa, C.M.S. Redfield, N. Zeldovich, and H. Balakrishnan, ―CryptDB: Protecting Confidentiality with Encrypted Query Processing,‖ Proc. 23rd ACM Symp. Operating Systems Principles, Oct. 2011.
H. Hacigu¨mu¨ s¸, B. Iyer, C. Li, and S. Mehrotra, ―Executing SQL over Encrypted Data in the Database-Service-Provider Model,‖ Proc. ACM SIGMOD Int’l Conf. Management Data, June 2002.
J. Li and E. Omiecinski, ―Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases,‖ Proc. 19th Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, Aug. 2005.
E. Mykletun and G. Tsudik, ―Aggregation Queries in the Database-as-a-Service Model,‖ Proc. 20th Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, July/Aug. 2006.
D. Agrawal, A.E. Abbadi, F. Emekci, and A. Metwally, ―Database Management as a Service: Challenges and Opportunities,‖ Proc. 25th IEEE Int’l Conf. Data Eng., Mar.-Apr. 2009.
V. Ganapathy, D. Thomas, T. Feder, H. GarciaMolina, and R. Motwani, ―Distributing Data for Secure Database Services,‖ Proc. Fourth ACM Int’l Workshop Privacy and Anonymity in the Information.
A. Shamir, ―How to Share a Secret,‖ Comm. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â