Skip to main content

Secure Data Outsourcing

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Database Systems
  • 36 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science; 1995.

    Google Scholar 

  2. Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the Network and Distributed Systems Security Symposium; 2012.

    Google Scholar 

  3. Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996;43(3):431–473.

    Article  MathSciNet  MATH  Google Scholar 

  4. Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of the IFIP TC11/ WG11.3 14th Annual Working Conference on Database Security; 2000.

    Google Scholar 

  5. Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of the IEEE 30th International Conference on Data Engineering; 2014.

    Google Scholar 

  6. Pang H, Tan K. Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering; 2004.

    Google Scholar 

  7. Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents. IEEE Trans Knowl Data Eng. 2004;16(10):1263–78.

    Article  Google Scholar 

  8. Carminati B, Ferrari E, Bertino E. Securing XML data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management; 2005.

    Google Scholar 

  9. Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG. Flexible authentication of XML documents. In: Proceedings of the 8th ACM Conference on Computer and Communication Security; 2001.

    Google Scholar 

  10. Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology; 2003.

    Google Scholar 

  11. Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. In: Proceedings of the 11th Annual Symposium on Network and Distributed System Security; 2004.

    Google Scholar 

  12. Narasimha M, Tsudik G. Authentication of outsourced databases using signature aggregation and chaining. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2006.

    Google Scholar 

  13. Pang H, Jain A, Ramamritham K, Tan K. Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2005.

    Google Scholar 

  14. Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2005.

    Google Scholar 

  15. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006.

    Google Scholar 

  16. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium of Security and Privacy; 2007.

    Google Scholar 

  17. Hacigümüş H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2002.

    Google Scholar 

  18. Hacigumus H, Iyer B, Li C, Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2004.

    Google Scholar 

  19. Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms. In: Lipton RJ, Dobkin DP, Jones AK, editors. Foundations of secure computation. Academic; 1978. p. 169–78.

    Google Scholar 

  20. Agrawal R, Kiernan J, Srikant R, Xu Y. Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2004.

    Google Scholar 

  21. Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy; 2000.

    Google Scholar 

  22. Goh E. Secure indexes, cryptology ePrint archive, Report 2003/216; 2003.

    Google Scholar 

  23. Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report; 2004.

    Google Scholar 

  24. Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the Applied Cryptography and Network Security Conference; 2004.

    Google Scholar 

  25. Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th Conference on Theory of Cryptography; 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Barbara Carminati .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Carminati, B. (2018). Secure Data Outsourcing. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_328

Download citation

Publish with us

Policies and ethics