Dividing secrets to secure data outsourcing

被引:31
|
作者
Emekci, Fatih [1 ]
Methwally, Ahmed [2 ]
Agrawal, Divyakant [2 ]
El Abbadi, Amr [2 ]
机构
[1] Turgut Ozal Univ, Dept Comp Sci, TR-06310 Ankara, Turkey
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
关键词
Data outsourcing; Query processing; Data privacy and security;
D O I
10.1016/j.ins.2013.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing or database as a service is a new paradigm for data management. The third party service provider hosts databases as a service. These parties provide efficient and cheap data management by obviating the need to purchase expensive hardware and software, deal with software upgrades and hire professionals for administrative and maintenance tasks. However, due to recent governmental legislations, competition among companies and database thefts, companies cannot use database service providers directly. They need secure and privacy preserving data management techniques to be able to use them in practice. Since data is remotely stored in a privacy preserving manner, there are efficiency related problems such as poor query response time. We propose a new framework that provides efficient and scalable query response times by reducing the computation and communication costs. Furthermore, the proposed technique uses several service providers to guarantee the availability of the services while detecting the dishonest or faulty service providers without introducing additional overhead on the query response time. The evaluations demonstrate that our data outsourcing framework is scalable and practical. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:198 / 210
页数:13
相关论文
共 50 条
  • [31] Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing
    Liu, Qin
    Peng, Yu
    Jiang, Hongbo
    Wu, Jie
    Wang, Tian
    Peng, Tao
    Wang, Guojun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 4181 - 4195
  • [32] Blockchain based secure medical data outsourcing with data deduplication in cloud environment
    Benil, T.
    Jasper, J.
    COMPUTER COMMUNICATIONS, 2023, 209 : 1 - 13
  • [33] A Semi-Outsourcing Secure Data Privacy Scheme for IoT Data Transmission
    Zhang, Xiaoshuai
    Poslad, Stefan
    Ma, Zixiang
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [34] In search of secure outsourcing
    Comput. Fraud Secur., 2009, 2 (13-15):
  • [35] A novel smart multilevel security approach for secure data outsourcing in crisis
    Sarhan, Akram Y.
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [36] A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data
    Salinas, Sergio
    Chen, Xuhui
    Ji, Jinlong
    Li, Pan
    IEEE ACCESS, 2016, 4 : 1406 - 1416
  • [37] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [38] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    Cluster Computing, 2021, 24 : 3591 - 3606
  • [39] Towards semantically secure outsourcing of association rule mining on categorical data
    Lai, Junzuo
    Li, Yingjiu
    Deng, Robert H.
    Weng, Jian
    Guan, Chaowen
    Yan, Qiang
    INFORMATION SCIENCES, 2014, 267 : 267 - 286
  • [40] Secure data stream outsourcing with publicly verifiable integrity in cloud storage
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49