Verifiable auditing for outsourced database in cloud computing

J Wang, X Chen, X Huang, I You… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The notion of database outsourcing enables the data owner to delegate the database
management to a cloud service provider (CSP) that provides various database services to …

IntegriDB: Verifiable SQL for outsourced databases

Y Zhang, J Katz, C Papamanthou - Proceedings of the 22nd ACM …, 2015 - dl.acm.org
This paper presents IntegriDB, a system allowing a data owner to outsource storage of a
database to an untrusted server, and then enable anyone to perform verifiable SQL queries …

Predictive spatio-temporal queries: a comprehensive survey and future directions

AM Hendawi, MF Mokbel - Proceedings of the First ACM SIGSPATIAL …, 2012 - dl.acm.org
Predictive queries over spatio-temporal data proved to be vital in many location-based
services including traffic management, ride sharing, and advertising. In the last few years …

Towards achieving flexible and verifiable search for outsourced database in cloud computing

J Wang, X Chen, J Li, J Zhao, J Shen - Future Generation Computer …, 2017 - Elsevier
The notion of outsourced database allows the data owner to outsource a database to the
cloud service provider (CSP), and then anyone can enjoy database services provided by the …

Spatial query integrity with voronoi neighbors

L Hu, WS Ku, S Bakiras… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
With the popularity of location-based services and the abundant usage of smart phones and
GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the …

Concerto: A high concurrency key-value store with integrity

A Arasu, K Eguro, R Kaushik, D Kossmann… - Proceedings of the …, 2017 - dl.acm.org
Verifying the integrity of outsourced data is a classic, well-studied problem. However current
techniques have fundamental performance and concurrency limitations for update-heavy …

Authenticated index structures for aggregation queries

F Li, M Hadjieleftheriou, G Kollios… - ACM Transactions on …, 2010 - dl.acm.org
Query authentication is an essential component in Outsourced DataBase (ODB) systems.
This article introduces efficient index structures for authenticating aggregation queries over …

[HTML][HTML] An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage

M Kumar, C Maple, S Chand - Journal of King Saud University-Computer …, 2023 - Elsevier
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity
of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance …

Authentication of moving knn queries

ML Yiu, E Lo, D Yung - 2011 IEEE 27th International …, 2011 - ieeexplore.ieee.org
A moving kNN query continuously reports the k nearest neighbors of a moving query point.
In addition to the query result, a service provider that evaluates moving queries often returns …

Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data

S Jiang, J Liu, L Wang, SM Yoo - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Outsourcing storage and computation to clouds is popular but also raises security concerns.
Most existing solutions mainly focus on an honest-but-curious cloud server, while security …