Dividing secrets to secure data outsourcing

被引:31
|
作者
Emekci, Fatih [1 ]
Methwally, Ahmed [2 ]
Agrawal, Divyakant [2 ]
El Abbadi, Amr [2 ]
机构
[1] Turgut Ozal Univ, Dept Comp Sci, TR-06310 Ankara, Turkey
[2] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
关键词
Data outsourcing; Query processing; Data privacy and security;
D O I
10.1016/j.ins.2013.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing or database as a service is a new paradigm for data management. The third party service provider hosts databases as a service. These parties provide efficient and cheap data management by obviating the need to purchase expensive hardware and software, deal with software upgrades and hire professionals for administrative and maintenance tasks. However, due to recent governmental legislations, competition among companies and database thefts, companies cannot use database service providers directly. They need secure and privacy preserving data management techniques to be able to use them in practice. Since data is remotely stored in a privacy preserving manner, there are efficiency related problems such as poor query response time. We propose a new framework that provides efficient and scalable query response times by reducing the computation and communication costs. Furthermore, the proposed technique uses several service providers to guarantee the availability of the services while detecting the dishonest or faulty service providers without introducing additional overhead on the query response time. The evaluations demonstrate that our data outsourcing framework is scalable and practical. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:198 / 210
页数:13
相关论文
共 50 条
  • [41] Separating Indexes from Data: A Distributed Scheme for Secure Database Outsourcing
    Soltani, Somayeh
    Hadavi, Mohammad Ali
    Jalili, Rasool
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (02): : 121 - 133
  • [42] Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators
    Li, Jin
    Ye, Heng
    Li, Tong
    Wang, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    Liu, Jiqiang
    Lu, Rongxing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 67 - 76
  • [43] Experimental analysis and comparative study of secure data outsourcing schemes in cloud
    Sudarsan Rao V.
    Satyanarayana N.
    International Journal of Cloud Computing, 2019, 8 (01) : 83 - 101
  • [44] Secure outsourcing of sequence comparisons
    Atallah M.J.
    Li J.
    International Journal of Information Security, 2005, 4 (4) : 277 - 287
  • [45] Secure outsourcing of scientific computations
    Atallah, MJ
    Pantazopoulos, KN
    Rice, JR
    Spafford, EE
    ADVANCES IN COMPUTERS, VOL 54: TRENDS IN SOFTWARE ENGINEERING, 2001, 54 : 215 - 272
  • [46] Secure Outsourcing of Matrix Convolutions
    Zhang, Kaijin
    Luo, Changqing
    Li, Pan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [47] Secure Outsourcing of Virtual Appliance
    Xia, Yubin
    Liu, Yutao
    Guan, Haibing
    Chen, Yunji
    Chen, Tianshi
    Zang, Binyu
    Chen, Haibo
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 390 - 404
  • [48] Secure outsourcing of sequence comparisons
    Atallah, MJ
    Li, JT
    PRIVACY ENHANCING TECHNOLOGIES, 2005, 3424 : 63 - 78
  • [49] Secure Sketch for Multiple Secrets
    Fang, Chengfang
    Li, Qiming
    Chang, Ee-Chien
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 367 - +
  • [50] A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
    Rahmani, Peyman
    Taheri, Mohammad
    Fakhrahmad, Seyed Mostafa
    IET COMMUNICATIONS, 2023, 17 (07) : 775 - 789