Extendible hashing—a fast access method for dynamic files
ACM Transactions on Database Systems (TODS)
Selective Data Encryption in Outsourced Dynamic Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Semantic methods for p2p query routing
MATES'05 Proceedings of the Third German conference on Multiagent System Technologies
Privacy-aware DaaS services composition
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Meerkat - A Dynamic Privacy Framework for Web Services
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Hi-index | 0.00 |
Databases as a Service (DaaS) are recently in the spotlight as an essential component of the cloud computing framework. We can more easily develop applications to facilitate users' collaboration than without DaaS. Unfortunately, DaaS brings a new risk of data compromise because most data are currently stored and managed by the service provider. Securing users' information, the data are generally encrypted at a trusted client. Although encryption ensures that no one can sneak a look at the data, malicious users still have opportunities to take users' relational information. The relational information, which we name social information as opposed to personal information, has not been adequately examined, but it is becoming important because of improvement of social analysis. As described herein, we first introduce an attack model of obtaining social information from analyses of query logs in DaaS; then we provide a solution to the problem. Our method converts some different queries in the same query, so that malicious attackers cannnot analyze the query logs. We also define an overhead cost of the translation and propose a method that can optimize the conversion using extensible hashing.