Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Secure Data Outsourcing

  • Barbara Carminati
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_328

Synonyms

Secure third-party data management

Definition

Data outsourcing is an emerging data management paradigm in which the owner of data is no longer totally responsible for its management. Rather, a portion of data is outsourced to external providers, potentially hosted in cloud platforms, who offer data management functionalities. Secure data outsourcing is a discipline that investigates security issues associated with data outsourcing.

Historical Background

Service outsourcing is a paradigm widely used by many companies and organizations to achieve better service. The key idea is to delegate some of their business functions to external specialized service providers. A natural evolution of this paradigm is the recent emergence of data outsourcing. With this strategy, a company is no longer completely responsible for its own data management. Rather, it outsources some of its data functionalities to one or more external data management service providers (e.g., offering efficient...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science; 1995.Google Scholar
  2. 2.
    Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the Network and Distributed Systems Security Symposium; 2012.Google Scholar
  3. 3.
    Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996;43(3):431–473.MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of the IFIP TC11/ WG11.3 14th Annual Working Conference on Database Security; 2000.Google Scholar
  5. 5.
    Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of the IEEE 30th International Conference on Data Engineering; 2014.Google Scholar
  6. 6.
    Pang H, Tan K. Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering; 2004.Google Scholar
  7. 7.
    Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents. IEEE Trans Knowl Data Eng. 2004;16(10):1263–78.CrossRefGoogle Scholar
  8. 8.
    Carminati B, Ferrari E, Bertino E. Securing XML data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management; 2005.Google Scholar
  9. 9.
    Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG. Flexible authentication of XML documents. In: Proceedings of the 8th ACM Conference on Computer and Communication Security; 2001.Google Scholar
  10. 10.
    Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology; 2003.Google Scholar
  11. 11.
    Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. In: Proceedings of the 11th Annual Symposium on Network and Distributed System Security; 2004.Google Scholar
  12. 12.
    Narasimha M, Tsudik G. Authentication of outsourced databases using signature aggregation and chaining. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2006.Google Scholar
  13. 13.
    Pang H, Jain A, Ramamritham K, Tan K. Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2005.Google Scholar
  14. 14.
    Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2005.Google Scholar
  15. 15.
    Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006.Google Scholar
  16. 16.
    Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium of Security and Privacy; 2007.Google Scholar
  17. 17.
    Hacigümüş H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2002.Google Scholar
  18. 18.
    Hacigumus H, Iyer B, Li C, Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2004.Google Scholar
  19. 19.
    Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms. In: Lipton RJ, Dobkin DP, Jones AK, editors. Foundations of secure computation. Academic; 1978. p. 169–78.Google Scholar
  20. 20.
    Agrawal R, Kiernan J, Srikant R, Xu Y. Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2004.Google Scholar
  21. 21.
    Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy; 2000.Google Scholar
  22. 22.
    Goh E. Secure indexes, cryptology ePrint archive, Report 2003/216; 2003.Google Scholar
  23. 23.
    Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report; 2004.Google Scholar
  24. 24.
    Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the Applied Cryptography and Network Security Conference; 2004.Google Scholar
  25. 25.
    Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th Conference on Theory of Cryptography; 2007.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Theoretical and Applied ScienceUniversity of InsubriaVareseItaly

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly