Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

386 CHAPTER 14 Protecting Data in Outsourcing Scenarios K.-Y. Whang, D. Lee, (Eds.), Proc. of DASFAA 2004, Jeju Island, Korea, March 2004, Springer. R.L. Rivest, L. Adleman, M.L. Dertouzos, On data banks and privacy homomorphisms, in: R.A. DeMillo, R.J. Lipton, A.K. Jones (Eds.), Foundation of Secure Computations, Academic Press, New York, 1978. Z.F. Wang, J. Dai, W. Wang, B.L. Shi, Fast query over encrypted character data in database, CIS, 4 (4) (2004) 289­300. A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, Modeling and assessing inference exposure in encrypted databases, ACM TISSEC, 8 (1) (2005) 119­152. G. Miklau, D. Suciu, Controlling access to published data using cryptography, in: J.C. Freytag, P.C. Lockemann, S. Abiteboul, M.J. Carey, P.G. Selinger, A. Heuer (Eds.), Proc. of VLDB 2003, Berlin, Germany, September 2003, Morgan Kaufmann. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Over-encryption: Management of access control evolution on outsourced data, in: C. Koch, Gehrke, M.N. Garofalakis, D.Srivastava, K. Aberer, A. Deshpande,D. Florescu, C.Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, E.J. Neuhold, (Eds.), Proc. of VLDB 2007, Vienna, Austria, September 2007, ACM. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, Encryption policies for regulating access to outsourced data, ACM TODS, 35 (2) (2010) 12:1­12:46. R.S. Sandhu, On some cryptographic solutions for access control in a tree hierarchy, in: Proc. of the 1987 Fall Joint Computer Conference on Exploring Technology: Today and Tomorrow, Dallas, TX, October 1987, IEEE Computer Society Press. R.S. Sandhu, Cryptographic implementation of a tree hierarchy for access control, IPL, 27 (2) (1988) 95­98. S. Akl, P. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM TOCS, 1 (3) (1983) 239­248. M. Atallah, M. Blanton, N. Fazio, K. Frikken, Dynamic and efficient key management for access hierarchies, ACM TISSEC, 12 (3) (2009) 18:1­18:43. M.J. Atallah, K.B. Frikken, M. Blanton, Dynamic and efficient key management for access hierarchies, in: Proc. of CCS 2005, Alexandria, VA, November 2005. J. Crampton, K. Martin, P. Wild, On key assignment for hierarchical access control, in: Proc. of CSFW 2006, Venice, Italy, July 2006, IEEE Computer Society Press. REFERENCES [1] K. Kant, Data center evolution: A tutorial on state of the art, issues, and challenges, Comput. Netw. 53(17) (2009) 2939­2965. [2] S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti, Privacy-aware biometrics: Design and implementation of a multimodal verification system, in: Proc. of ACSAC 2008, Anaheim, CA, December 2008, IEEE Computer Society. [3] M. Gamassi, M. Lazzaroni, M. Misino, V. Piuri, D. Sana, F. Scotti, Accuracy and performance of biometric systems, in: S. Demidenko, R. Ottoboni, D. Petri, V. Piuri, D. Chong, T. Weng (Eds.), Proc. of IMTC 2004, Como, Italy, 2004, IEEE Computer Society. [4] M. Gamassi, V. Piuri, D. Sana, F. Scotti, Robust fingerprint detection for access control, in: Proc. of RoboCare Workshop 2005, Rome, Italy, May 2005, CNR. [5] Pierangela Samarati, Sabrina De Capitani di Vimercati, Data protection in outsourcing scenarios: Issues and directions, in: D. Feng, D.A. Basin, P. Liu, (Eds.), Proc. of ASIACCS 2010, Beijing, China, April 2010, ACM. [6] E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, in: S. Jajodia, V. Atluri, T. Jaeger, (Eds.), Proc. of CCS 2003, Washington, DC, October 2003, ACM. ¨ ¨ [7] H. Hacig um us, B. Iyer, S. Mehrotra, Providing database as a service, in: D. Georgakopoulos, R. Agrawal, K. Dittrich, (Eds.), Proc. of ICDE 2002, San Jose, CA, February 2002, IEEE Computer Society. ¨ ¨ [8] H. Hacig um us, B. Iyer, S. Mehrotra, C. Li, Executing SQL over encrypted data in the database-service-provider model, in: M.J. Franklin, B. Moon, A. Ailamaki, (Eds.), Proc. of the SIGMOD 2002, Madison, WI, June 2002, ACM. [9] R. Agrawal, J. Kierman, R. Srikant, Y. Xu, Order preserving encryption for numeric data, in: ¨ G. Weikum, A. Christian K onig, S. Deloch, (Eds.), Proc. of SIGMOD 2004, Paris, France, June 2004, ACM. [10] H. Wang, Laks V.S. Lakshmanan, Efficient secure query evaluation over encrypted XML databases, in: U. Dayal, K.-Y. Whang, D.B. Lomet, G. Alonso, G.M. Lohman, M.L. Kersten, S.K. Cha, Y-K. Kim, Proc. of VLDB 2006, Seoul, Korea, September 2006, ACM. [11] C. Gentry, Fully homomorphic encryption using ideal lattices, in: M. Mitzenmacher, (Ed.), Proc. of STOC 2009, Bethesda, MA, May 2009, ACM. ¨ ¨ [12] H. Hacig um us, B. Iyer, S. Mehrotra, Efficient execution of aggregation queries over encrypted relational databases, in: Y.-J. Lee, J. Li, [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24]