Dividing secrets to secure data outsourcing

被引:31
|
作者
Emekci, Fatih [1 ]
Methwally, Ahmed [2 ]
Agrawal, Divyakant [2 ]
El Abbadi, Amr [2 ]
机构
[1] Turgut Ozal Univ, Dept Comp Sci, TR-06310 Ankara, Turkey
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
关键词
Data outsourcing; Query processing; Data privacy and security;
D O I
10.1016/j.ins.2013.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing or database as a service is a new paradigm for data management. The third party service provider hosts databases as a service. These parties provide efficient and cheap data management by obviating the need to purchase expensive hardware and software, deal with software upgrades and hire professionals for administrative and maintenance tasks. However, due to recent governmental legislations, competition among companies and database thefts, companies cannot use database service providers directly. They need secure and privacy preserving data management techniques to be able to use them in practice. Since data is remotely stored in a privacy preserving manner, there are efficiency related problems such as poor query response time. We propose a new framework that provides efficient and scalable query response times by reducing the computation and communication costs. Furthermore, the proposed technique uses several service providers to guarantee the availability of the services while detecting the dishonest or faulty service providers without introducing additional overhead on the query response time. The evaluations demonstrate that our data outsourcing framework is scalable and practical. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:198 / 210
页数:13
相关论文
共 50 条
  • [21] Outsourcing protects trade secrets
    Donberg, Deborah
    Paper, Film and Foil Converter, 2002, 76 (11):
  • [22] Recent Advances in Information-Theoretically Secure Data Outsourcing
    Mehrotra, Sharad
    Sharma, Shantanu
    PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 31 - 32
  • [23] Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing
    Yang, Zhen
    Huang, Yongfeng
    Li, Xing
    Wang, Wenyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (01): : 1 - 17
  • [24] Data Outsourcing based on Secure Association Rule Mining Processes
    Sujatha, V.
    Bhattacharyya, Debnath
    Chaitanya, P. Silpa
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 41 - 48
  • [25] GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud
    Patil, Vikram
    Parikh, Shivam
    Singh, Priyanka
    Atrey, Pradeep K.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 495 - 501
  • [26] Hybrid Deduplication for Secure and Efficient Data Outsourcing in Fog Computing
    Koo, Dongyoung
    Shin, Youngjoo
    Yun, Joobeom
    Hur, Junbeom
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 285 - 293
  • [27] Efficient Architecture for Secure Outsourcing of Data and Computation in Hybrid Cloud
    Lunawat, Sonali
    Patankar, Abhijit
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 380 - 383
  • [28] CryptoML: Secure Outsourcing of Big Data Machine Learning Applications
    Mirhoseini, Azalia
    Sadeghi, Ahmad-Reza
    Koushanfar, Farinaz
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 149 - 154
  • [29] Secure data outsourcing in presence of the inference problem: issues and directions
    Jebali, Adel
    Sassi, Salma
    Jemai, Abderrazak
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2021, 5 (01) : 16 - 34
  • [30] Secure kNN Computation and Integrity Assurance of Data Outsourcing in the Cloud
    Hong, Jun
    Wen, Tao
    Guo, Quan
    Ye, Zhengwang
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017