Verifiable auditing for outsourced database in cloud computing
The notion of database outsourcing enables the data owner to delegate the database
management to a cloud service provider (CSP) that provides various database services to …
management to a cloud service provider (CSP) that provides various database services to …
IntegriDB: Verifiable SQL for outsourced databases
This paper presents IntegriDB, a system allowing a data owner to outsource storage of a
database to an untrusted server, and then enable anyone to perform verifiable SQL queries …
database to an untrusted server, and then enable anyone to perform verifiable SQL queries …
Predictive spatio-temporal queries: a comprehensive survey and future directions
AM Hendawi, MF Mokbel - Proceedings of the First ACM SIGSPATIAL …, 2012 - dl.acm.org
Predictive queries over spatio-temporal data proved to be vital in many location-based
services including traffic management, ride sharing, and advertising. In the last few years …
services including traffic management, ride sharing, and advertising. In the last few years …
Towards achieving flexible and verifiable search for outsourced database in cloud computing
The notion of outsourced database allows the data owner to outsource a database to the
cloud service provider (CSP), and then anyone can enjoy database services provided by the …
cloud service provider (CSP), and then anyone can enjoy database services provided by the …
Spatial query integrity with voronoi neighbors
With the popularity of location-based services and the abundant usage of smart phones and
GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the …
GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the …
Concerto: A high concurrency key-value store with integrity
A Arasu, K Eguro, R Kaushik, D Kossmann… - Proceedings of the …, 2017 - dl.acm.org
Verifying the integrity of outsourced data is a classic, well-studied problem. However current
techniques have fundamental performance and concurrency limitations for update-heavy …
techniques have fundamental performance and concurrency limitations for update-heavy …
Authenticated index structures for aggregation queries
Query authentication is an essential component in Outsourced DataBase (ODB) systems.
This article introduces efficient index structures for authenticating aggregation queries over …
This article introduces efficient index structures for authenticating aggregation queries over …
[HTML][HTML] An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity
of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance …
of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance …
Authentication of moving knn queries
A moving kNN query continuously reports the k nearest neighbors of a moving query point.
In addition to the query result, a service provider that evaluates moving queries often returns …
In addition to the query result, a service provider that evaluates moving queries often returns …
Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data
S Jiang, J Liu, L Wang, SM Yoo - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Outsourcing storage and computation to clouds is popular but also raises security concerns.
Most existing solutions mainly focus on an honest-but-curious cloud server, while security …
Most existing solutions mainly focus on an honest-but-curious cloud server, while security …