Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science; 1995.
Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the Network and Distributed Systems Security Symposium; 2012.
Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996;43(3):431–473.
Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of the IFIP TC11/ WG11.3 14th Annual Working Conference on Database Security; 2000.
Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of the IEEE 30th International Conference on Data Engineering; 2014.
Pang H, Tan K. Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering; 2004.
Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents. IEEE Trans Knowl Data Eng. 2004;16(10):1263–78.
Carminati B, Ferrari E, Bertino E. Securing XML data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management; 2005.
Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG. Flexible authentication of XML documents. In: Proceedings of the 8th ACM Conference on Computer and Communication Security; 2001.
Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology; 2003.
Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. In: Proceedings of the 11th Annual Symposium on Network and Distributed System Security; 2004.
Narasimha M, Tsudik G. Authentication of outsourced databases using signature aggregation and chaining. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2006.
Pang H, Jain A, Ramamritham K, Tan K. Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2005.
Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2005.
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium of Security and Privacy; 2007.
Hacigümüş H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2002.
Hacigumus H, Iyer B, Li C, Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2004.
Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms. In: Lipton RJ, Dobkin DP, Jones AK, editors. Foundations of secure computation. Academic; 1978. p. 169–78.
Agrawal R, Kiernan J, Srikant R, Xu Y. Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2004.
Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy; 2000.
Goh E. Secure indexes, cryptology ePrint archive, Report 2003/216; 2003.
Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report; 2004.
Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the Applied Cryptography and Network Security Conference; 2004.
Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th Conference on Theory of Cryptography; 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Carminati, B. (2018). Secure Data Outsourcing. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_328
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_328
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering