Storing text retrieval systems on CD-ROM: compression and encryption considerations
ACM Transactions on Information Systems (TOIS)
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
CryptoCache: a secure sharable file cache for roaming users
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Appia: Automatic Storage Area Network Fabric Design
FAST '02 Proceedings of the Conference on File and Storage Technologies
A Multiuser Performance Analysis of Alternative Declustering Strategies
Proceedings of the Sixth International Conference on Data Engineering
Private Information Retrieval in the Presence of Malicious Failures
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
Chip-secured data access: confidential data on untrusted servers
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Key management for multi-user encrypted databases
Proceedings of the 2005 ACM workshop on Storage security and survivability
Selective Data Encryption in Outsourced Dynamic Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
A robust methodology for prediction of trust and reputation values
Proceedings of the 2008 ACM workshop on Secure web services
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
Metadata management in outsourced encrypted databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Privacy-Preserving search and updates for outsourced tree-structured data on untrusted servers
iTrust'05 Proceedings of the Third international conference on Trust Management
EISA – an enterprise application security solution for databases
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |
Several architectures have been recently proposed thatstore relational data in encrypted form on untrusted relationaldatabases. Such architectures permit the creation ofnovel Internet services and also offer an opportunity for abetter construction of ASP solutions. Environments wherethere are limited resources that do not permit an efficientmanagement of databases or where it is critical to offer arobust Internet access to private data may all benefit fromthe above architectures. In this paper we analyze the impactthat this architecture has on the typical services of adatabase. The analysis is based on the experience gainedin the construction of a prototype of a complete architecturefor the management of encrypted databases. Specifically,we illustrate the impact on query translation and optimization,and the main components of the software architectureof the prototype.