Security&privacy issues and challenges in NoSQL databases
Organizing the storing of information and data retrieval from databases is a crucial issue,
which has become more critical with the spreading of cloud and Internet of Things (IoT) …
which has become more critical with the spreading of cloud and Internet of Things (IoT) …
Secure k-nearest neighbor query over encrypted data in outsourced environments
Y Elmehdwi, BK Samanthula… - 2014 IEEE 30th …, 2014 - ieeexplore.ieee.org
For the past decade, query processing on relational data has been studied extensively, and
many theoretical and practical solutions to query processing have been proposed under …
many theoretical and practical solutions to query processing have been proposed under …
Secure kNN computation on encrypted databases
WK Wong, DW Cheung, B Kao… - Proceedings of the 2009 …, 2009 - dl.acm.org
Service providers like Google and Amazon are moving into the SaaS (Software as a
Service) business. They turn their huge infrastructure into a cloud-computing environment …
Service) business. They turn their huge infrastructure into a cloud-computing environment …
Processing analytical queries over encrypted data
MONOMI is a system for securely executing analytical workloads over sensitive data on an
untrusted database server. MONOMI works by encrypting the entire database and running …
untrusted database server. MONOMI works by encrypting the entire database and running …
Deterministic and efficiently searchable encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them,
for public-key encryption schemes where the encryption algorithm is deterministic. We …
for public-key encryption schemes where the encryption algorithm is deterministic. We …
TrustedDB: a trusted hardware based database with privacy and data confidentiality
S Bajaj, R Sion - Proceedings of the 2011 ACM SIGMOD International …, 2011 - dl.acm.org
TrustedDB is an outsourced database prototype that allows clients to execute SQL queries
with privacy and under regulatory compliance constraints without having to trust the service …
with privacy and under regulatory compliance constraints without having to trust the service …
Secure nearest neighbor revisited
In this paper, we investigate the secure nearest neighbor (SNN) problem, in which a client
issues an encrypted query point E (q) to a cloud service provider and asks for an encrypted …
issues an encrypted query point E (q) to a cloud service provider and asks for an encrypted …
[PDF][PDF] A privacy-preserving index for range queries
Database outsourcing is an emerging data management paradigm which has the potential
to transform the IT operations of corporations. In this paper we address privacy threats in …
to transform the IT operations of corporations. In this paper we address privacy threats in …
Secure multidimensional range queries over outsourced data
In this paper, we study the problem of supporting multidimensional range queries on
encrypted data. The problem is motivated by secure data outsourcing applications where a …
encrypted data. The problem is motivated by secure data outsourcing applications where a …
Two can keep a secret: A distributed architecture for secure database services
Recent trends towards database outsourcing, as well as concerns and laws governing data
privacy, have led to great interest in enabling secure database services. Previous …
privacy, have led to great interest in enabling secure database services. Previous …