Secure network provenance

W Zhou, Q Fei, A Narayan, A Haeberlen… - Proceedings of the …, 2011 - dl.acm.org
This paper introduces secure network provenance (SNP), a novel technique that enables
networked systems to explain to their operators why they are in a certain state--eg, why a …

Authenticating the query results of text search engines

HH Pang, K Mouratidis - Proceedings of the VLDB Endowment, 2008 - dl.acm.org
The number of successful attacks on the Internet shows that it is very difficult to guarantee
the security of online search engines. A breached server that is not detected in time may …

Integrity for join queries in the cloud

SDC di Vimercati, S Foresti, S Jajodia… - … on Cloud Computing, 2013 - ieeexplore.ieee.org
We address the problem of providing users with the ability to assess the integrity of join
results produced by external computational providers and computed over externally stored …

Secure top-k query processing via untrusted location-based service providers

R Zhang, Y Zhang, C Zhang - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
This paper considers a novel distributed system for collaborative location-based information
generation and sharing which become increasingly popular due to the explosive growth of …

Secure outsourced aggregation via one-way chains

S Nath, H Yu, H Chan - Proceedings of the 2009 ACM SIGMOD …, 2009 - dl.acm.org
We consider the Outsourced Aggregation model, where sensing services outsource their
sensor data collection and aggregation tasks to third-party service providers called …

Secure spatial top-k query processing via untrusted location-based service providers

R Zhang, J Sun, Y Zhang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper considers a novel distributed system for collaborative location-based information
generation and sharing which become increasingly popular due to the explosive growth of …

Query assurance verification for outsourced multi-dimensional databases

W Cheng, KL Tan - Journal of Computer Security, 2009 - content.iospress.com
In data outsourcing model, data owners engage third-party data servers (called publishers)
to manage their data and process queries on their behalf. As these publishers may be …

Freshness authentication for outsourced multi-version key-value stores

Y Hu, X Yao, R Zhang, Y Zhang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data outsourcing is a promising technical paradigm to facilitate cost-effective real-time data
storage, processing, and dissemination. In data outsourcing, a data owner proactively …

Towards a data-centric view of cloud security

W Zhou, M Sherr, WR Marczak, Z Zhang, T Tao… - Proceedings of the …, 2010 - dl.acm.org
Cloud security issues have recently gained traction in the research community, with much of
the focus primarily concentrated on securing the operating systems and virtual machines on …

Integrity for distributed queries

SDC di Vimercati, S Foresti, S Jajodia… - … IEEE Conference on …, 2014 - ieeexplore.ieee.org
We propose an approach for allowing users to assess the integrity of distributed queries
computed by a computational cloud, which is trusted neither for data confidentiality nor for …