Authenticating aggregate queries over set-valued data with confidentiality

C Xu, Q Chen, H Hu, J Xu, X Hei - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With recent advances in data-as-a-service (DaaS) and cloud computing, aggregate query
services over set-valued data are becoming widely available for business intelligence that …

: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments

Q Liu, Y Peng, Q Xu, H Jiang, J Wu… - … on Dependable and …, 2023 - ieeexplore.ieee.org
The huge values created by Big Data and the recent advances in cloud computing have
been driving data from different sources into cloud repositories for comprehensive query …

When query authentication meets fine-grained access control: A zero-knowledge approach

C Xu, J Xu, H Hu, MH Au - … of the 2018 International Conference on …, 2018 - dl.acm.org
Query authentication has been extensively studied to ensure the integrity of query results for
outsourced databases, which are often not fully trusted. However, access control, another …

Authenticated online data integration services

Q Chen, H Hu, J Xu - Proceedings of the 2015 ACM SIGMOD …, 2015 - dl.acm.org
Data integration involves combining data from multiple sources and providing users with a
unified query interface. Data integrity has been a key problem in online data integration …

Authenticated index structures for aggregation queries

F Li, M Hadjieleftheriou, G Kollios… - ACM Transactions on …, 2010 - dl.acm.org
Query authentication is an essential component in Outsourced DataBase (ODB) systems.
This article introduces efficient index structures for authenticating aggregation queries over …

A privacy-aware query authentication index for database outsourcing

M Jang, M Yoon, JW Chang - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Recently, cloud computing has been spotlighted as a new paradigm of database
management system. In this environment, databases are outsourced and deployed on a …

Bucket‐based authentication for outsourced databases

J Wang, X Du, J Lu, W Lu - Concurrency and Computation …, 2010 - Wiley Online Library
When outsourced database owners delegate their data to service providers, which might be
untrusted or compromised, two issues of data security emerge, including data confidentiality …

Privacy and integrity preserving multi-dimensional range queries for cloud computing

F Chen, AX Liu - 2014 IFIP Networking Conference, 2014 - ieeexplore.ieee.org
In cloud computing, a cloud provider hosts the data of an organization and replies query
results to the customers of the organization. Because organization's data are confidential …

Flexible and publicly verifiable aggregation query for outsourced databases in cloud

J Yuan, S Yu - 2013 IEEE Conference on Communications and …, 2013 - ieeexplore.ieee.org
For securing databases outsourced to the cloud, it is important to allow cloud users to verify
that their queries to the cloud-hosted databases are correctly executed by the cloud. Existing …

Panda: Partitioned data security on outsourced sensitive and non-sensitive data

S Mehrotra, S Sharma, JD Ullman, D Ghosh… - ACM Transactions on …, 2020 - dl.acm.org
Despite extensive research on cryptography, secure and efficient query processing over
outsourced data remains an open challenge. This article continues along with the emerging …