Database management as a service: Challenges and opportunities

D Agrawal, A El Abbadi, F Emekci… - 2009 IEEE 25th …, 2009 - ieeexplore.ieee.org
Data outsourcing or database as a service is a new paradigm for data management in which
a third party service provider hosts a database as a service. The service provides data …

Database encryption: an overview of contemporary challenges and design considerations

E Shmueli, R Vaisenberg, Y Elovici, C Glezer - ACM SIGMOD Record, 2010 - dl.acm.org
This article describes the major challenges and design considerations pertaining to
database encryption. The article first presents an attack model and the main relevant …

Encryption policies for regulating access to outsourced data

SDCD Vimercati, S Foresti, S Jajodia… - ACM Transactions on …, 2010 - dl.acm.org
Current access control models typically assume that resources are under the strict custody of
a trusted party which monitors each access request to verify if it is compliant with the …

[PDF][PDF] 数据库服务——安全与隐私保护

田秀霞, 王晓玲, 高明, 周傲英 - 软件学报, 2010 - jos.org.cn
主要从数据的机密性, 数据的完整性, 数据的完备性, 查询隐私保护以及访问控制策略这5
个关键技术, 综述国际上在数据库服务——安全与隐私保护方面的研究进展 …

A comprehensive framework for secure query processing on relational data in the cloud

S Wang, D Agrawal, A El Abbadi - … 8th VLDB Workshop, SDM 2011, Seattle …, 2011 - Springer
Data security in the cloud is a big concern that blocks the widespread use of the cloud for
relational data management. First, to ensure data security, data confidentiality needs to be …

Implementing a database encryption solution, design and implementation issues

E Shmueli, R Vaisenberg, E Gudes, Y Elovici - Computers & security, 2014 - Elsevier
In this paper, we analyze and compare five traditional architectures for database encryption.
We show that existing architectures may provide a high level of security, but have a …

Conjunctive search in encrypted data

CD Cash, S Jarecki, CS Jutla, HM Krawczyk… - US Patent …, 2017 - Google Patents
A method comprises receiving a first cryptographic token for one search term and a second
cryptographic token is generated using the one search term and at least another search …

Shuffle index: Efficient and private access to outsourced data

SDCD Vimercati, S Foresti, S Paraboschi… - ACM Transactions on …, 2015 - dl.acm.org
Data outsourcing and cloud computing have been emerging at an ever-growing rate as
successful approaches for allowing users and companies to rely on external services for …

An efficient secure system for fetching data from the outsourced encrypted databases

S Almakdi, B Panda, MS Alshehri, A Alazeb - IEEE Access, 2021 - ieeexplore.ieee.org
Recently, database users have begun to use cloud database services to outsource their
databases. The reason for this is the high computation speed and the huge storage capacity …

Panda: Partitioned data security on outsourced sensitive and non-sensitive data

S Mehrotra, S Sharma, JD Ullman, D Ghosh… - ACM Transactions on …, 2020 - dl.acm.org
Despite extensive research on cryptography, secure and efficient query processing over
outsourced data remains an open challenge. This article continues along with the emerging …