scispace - formally typeset
Journal ArticleDOI

Processing secure, verifiable and efficient SQL over outsourced database

TLDR
This paper proposes a new cloud database model by introducing computation service providers (CSPs), which can accommodate the conventional DBaaS model; the CSPs undertake most of the postprocessing and reconstruction burden for database query.
About
This article is published in Information Sciences.The article was published on 2016-06-20. It has received 29 citations till now. The article focuses on the topics: Cloud database & SQL.

read more

Citations
More filters
Journal ArticleDOI

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

TL;DR: This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view.
Journal ArticleDOI

SHAMC: A Secure and highly available database system in multi-cloud environment

TL;DR: This paper proposes a secure and highly available cloud database system in the multi-cloud named SHAMC which uses the idea of secure multiparty computation and homomorphic encryption to store data and execute queries direct on the ciphertext.
Journal ArticleDOI

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

TL;DR: Hemomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data.
Journal ArticleDOI

A Benchmark Database and Baseline Evaluation for Fall Detection Based on Wearable Sensors for the Internet of Medical Things Platform

TL;DR: A benchmark database, namely, a fall detection database, is presented to evaluate the performance of detection algorithms and various methods and detection algorithms based on wearable sensors are introduced.
Journal ArticleDOI

Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data

TL;DR: Wang et al. as discussed by the authors proposed a new paradigm called integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data, which is designed for one of the most common scenario, that is, the user concerns the integrity of a portion of encrypted cloud files that contain his/her interested keywords.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Fully homomorphic encryption using ideal lattices

TL;DR: This work proposes a fully homomorphic encryption scheme that allows one to evaluate circuits over encrypted data without being able to decrypt, and describes a public key encryption scheme using ideal lattices that is almost bootstrappable.
Journal ArticleDOI

Introduction to algorithms: 4. Turtle graphics

TL;DR: In this article, a language similar to logo is used to draw geometric pictures using this language and programs are developed to draw geometrical pictures using it, which is similar to the one we use in this paper.
Proceedings ArticleDOI

Executing SQL over encrypted data in the database-service-provider model

TL;DR: The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data.
Book ChapterDOI

Cryptographic cloud storage

TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Related Papers (5)