Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A framework for high assurance security of distributed objects
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
A scalable and highly available system for serving dynamic data at frequently accessed web sites
SC '98 Proceedings of the 1998 ACM/IEEE conference on Supercomputing
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Access Rights Administration in Role-Based Security Systems
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Database Security Integration using Role-Based Access Control
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Uncheatable Distributed Computations
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
On Five Definitions of Data Integrity
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Author-X: A Java-Based System for XML Data Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
User Authentication in Multidatabase Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Providing Database as a Service
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Specifying access control policies for XML documents with XPath
Proceedings of the ninth ACM symposium on Access control models and technologies
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
IEEE Intelligent Systems
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Technical forum: worm storage is not enough
IBM Systems Journal
Proof-infused streams: enabling authentication of sliding window queries on streams
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Providing freshness guarantees for outsourced databases
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Preserving confidentiality of security policies in data outsourcing
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Dual encryption for query integrity assurance
Proceedings of the 17th ACM conference on Information and knowledge management
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated indexing for outsourced spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Authenticated join processing in outsourced databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Secure outsourced aggregation via one-way chains
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
An audit environment for outsourcing of frequent itemset mining
Proceedings of the VLDB Endowment
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Proceedings of the 13th International Conference on Extending Database Technology
Authenticated relational tables and authenticated skip lists
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Continuous authentication on relational streams
The VLDB Journal — The International Journal on Very Large Data Bases
Verifying spatial queries using Voronoi neighbors
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Authenticated Index Structures for Aggregation Queries
ACM Transactions on Information and System Security (TISSEC)
Fine-grained cloud DB damage examination based on bloom filters
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Efficient audit-based compliance for relational data retention
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Toward practical and unconditional verification of remote computations
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
Cooperative data access in multi-cloud environments
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
CryptDB: protecting confidentiality with encrypted query processing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Uncheatable reputation for distributed computation markets
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Integrity verification of cloud-hosted data analytics computations
Proceedings of the 1st International Workshop on Cloud Intelligence
Hourglass schemes: how to prove that cloud files are encrypted
Proceedings of the 2012 ACM conference on Computer and communications security
Authentication of moving range queries
Proceedings of the 21st ACM international conference on Information and knowledge management
AUDIO: an integrity auditing framework of outlier-mining-as-a-service systems
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
iBigTable: practical data integrity for bigtable in public cloud
Proceedings of the third ACM conference on Data and application security and privacy
Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data
Information Resources Management Journal
CloudOptimizer: multi-tenancy for I/O-bound OLAP workloads
Proceedings of the 16th International Conference on Extending Database Technology
Delegation of computation with verification outsourcing: curious verifiers
Proceedings of the 2013 ACM symposium on Principles of distributed computing
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
ACM SIGOPS 24th Symposium on Operating Systems Principles
Verifying computations with state
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
Proceedings of the First International Workshop on Middleware for Cloud-enabled Sensing
Hi-index | 0.00 |
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a specialized provider. The solution is not limited to simple selection predicate queries but handles arbitrary query types. While this work focuses mainly on read-only, compute-intensive (e.g. data-mining) queries, it also provides preliminary mechanisms for handling data updates (at additional costs). We introduce query execution proofs; for each executed batch of queries the database service provider is required to provide a strong cryptographic proof that provides assurance that the queries were actually executed correctly over their entire target data set. We implement a proof of concept and present experimental results in a real-world data mining application, proving the deployment feasibility of our solution. We analyze the solution and show that its overheads are reasonable and are far outweighed by the added security benefits. For example an assurance level of over 95% can be achieved with less than 25% execution time overhead.