Cloud-Specific Services for Data Management

  • Wolfgang Lehner
  • Kai-Uwe Sattler
Chapter

Abstract

Cloud-based data management poses several challenges which go beyond traditional database technologies. Outsourcing the operation of database applications to a provider who, on the one hand, takes responsibility not only for providing the infrastructure but also for maintaining the system and, on the other hand, can pool resources and operate them in a cost-efficient and dynamic way promise cost savings and elasticity in usage. However, most customers are willing to move their on-premise setup to a hosted environment only if their data are kept securely and privately as well as non-functional properties such as availability or performance are guaranteed.

Keywords

Migration CapEx 

References

  1. 1.
    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Journal of Cryptology 21(3), 350–391 (2008)MathSciNetMATHCrossRefGoogle Scholar
  2. 2.
    Ada Popa, R., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: SOSP (2011)Google Scholar
  3. 3.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009). URL http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
  4. 4.
    Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: CRYPTO (2007)Google Scholar
  5. 5.
    Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: EUROCRYPT (2009)Google Scholar
  6. 6.
    Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM Journal of Computing 32(3), 586–615 (2003)MathSciNetMATHCrossRefGoogle Scholar
  7. 7.
    Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. In: TCC (2005)Google Scholar
  8. 8.
    Cassier, P., Defendi, A., Fischer, D., Hutchinson, J., Maneville, A., Membrini, G., Ong, C., Rowley, A.: System Programmer’s Guide to Workload Manager. No. SG24-6472-03 in Redbooks. IBM (2008)Google Scholar
  9. 9.
    Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Public Key Cryptography (2001)Google Scholar
  10. 10.
    Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal of Computing 30(2), 391–437 (2000)MathSciNetMATHCrossRefGoogle Scholar
  11. 11.
    Ganapathi, A., Kuno, H.A., Dayal, U., Wiener, J.L., Fox, A., Jordan, M.I., Patterson, D.A.: Predicting multiple metrics for queries: Better decisions enabled by machine learning. In: ICDE, pp. 592–603 (2009)Google Scholar
  12. 12.
    Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC (2009)Google Scholar
  13. 13.
    Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. Cryptology ePrint Archive, Report 2010/520 (2010)Google Scholar
  14. 14.
    Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Sciences 28(2), 270–299 (1984)MathSciNetMATHCrossRefGoogle Scholar
  15. 15.
    Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: SIGMOD (2002)Google Scholar
  16. 16.
    Kephart, J.O., Das, R.: Achieving self-management via utility functions. IEEE Internet Computing 11(1), 40–48 (2007)CrossRefGoogle Scholar
  17. 17.
    Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS (1997)Google Scholar
  18. 18.
    Lee, L.T., Lee, S.T., Chang, J.C.: An extenics-based dynamic resource adjustment for the virtual machine in cloud computing environment. In: , 2011 4th International Conference on Ubi-Media Computing (U-Media), pp. 65–70 (2011)Google Scholar
  19. 19.
    Ostrovsky, R., III, W.E.S.: A survey of single-database private information retrieval: Techniques and applications. In: Public Key Cryptography (2007)Google Scholar
  20. 20.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT (1999)Google Scholar
  21. 21.
    Ramamritham, K.: Real-time databases. Distributed and Parallel Databases 1(2), 199–226 (1993)CrossRefGoogle Scholar
  22. 22.
    Shi, E., Bethencourt, J., Chan, H.T.H., Song, D.X., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy (2007)Google Scholar
  23. 23.
    Soror, A.A., Minhas, U.F., Aboulnaga, A., Salem, K., Kokosielis, P., Kamath, S.: Automatic Virtual Machine Configuration for Database Workloads. ACM Transactions on Database Systems 35(1), 1–47 (2010)CrossRefGoogle Scholar
  24. 24.
    Xiong, P., Chi, Y., Zhu, S., Moon, H.J., Pu, C., Hacigümüs, H.: Intelligent management of virtualized resources for database systems in cloud environment. In: ICDE, pp. 87–98 (2011)Google Scholar
  25. 25.
    Yang, C.T., Wang, K.C., Cheng, H.Y., Kuo, C.T., Chu, W.: Green power management with dynamic resource allocation for cloud virtual machines. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 726 –733 (2011)Google Scholar
  26. 26.
    Zhang, Q., Zhu, Q., Boutaba, R.: Dynamic resource allocation for spot markets in cloud computing environments. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 178–185 (2011)Google Scholar
  27. 27.
    Zhu, Q., Agrawal, G.: Resource provisioning with budget constraints for adaptive applications in cloud environments. In: Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, pp. 304–307 (2010)Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Wolfgang Lehner
    • 1
  • Kai-Uwe Sattler
    • 2
  1. 1.Dresden University of TechnologyDresdenGermany
  2. 2.Ilmenau University of TechnologyIlmenauGermany

Personalised recommendations