[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Emekci et al., 2014 - Google Patents

Dividing secrets to secure data outsourcing

Emekci et al., 2014

Document ID
13018470486179740258
Author
Emekci F
Methwally A
Agrawal D
El Abbadi A
Publication year
Publication venue
Information Sciences

External Links

Snippet

Data outsourcing or database as a service is a new paradigm for data management. The third party service provider hosts databases as a service. These parties provide efficient and cheap data management by obviating the need to purchase expensive hardware and …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • G06F17/30321Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Similar Documents

Publication Publication Date Title
Emekci et al. Dividing secrets to secure data outsourcing
Fuller et al. Sok: Cryptographically protected database search
Agrawal et al. Database management as a service: Challenges and opportunities
US8898478B2 (en) Method for querying data in privacy preserving manner using attributes
CN104620533B (en) Homomorphic cryptography for data base querying
US7783900B2 (en) Querying encrypted data in a relational database system
Hacigümüş et al. Ensuring the integrity of encrypted databases in the database-as-a-service model
Hadavi et al. Security and searchability in secret sharing-based data outsourcing
Moghadam et al. Toward securing cloud-based data analytics: A discussion on current solutions and open issues
Rauthan et al. Vrs-db: Preserve confidentiality of users’ data using encryption approach
Ying et al. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Dagher et al. SecDM: privacy-preserving data outsourcing framework with differential privacy
Zeng et al. P3GQ: a practical privacy-preserving generic location-based services query scheme
Kumar et al. Approaches and challenges of privacy preserving search over encrypted data
Raghavendra et al. Survey on data storage and retrieval techniques over encrypted cloud data
Wang et al. Search ranges efficiently and compatibly as keywords over encrypted data
Muhammad et al. A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
Cao et al. Blockchain-based accountability for multi-party oblivious RAM
Barouti et al. Symmetrically-private database search in cloud computing
Sareen et al. Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme
Agrawal et al. Secure data management service on cloud computing infrastructures
Hore et al. Managing and querying encrypted data
Sobati Moghadam et al. Enforcing privacy in cloud databases
Rahmani et al. New attacks on secret sharing-based data outsourcing: toward a resistant scheme
Sobati-Moghadam Efficient information-theoretically secure schemes for cloud data outsourcing