Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: De Capitani di Vimercati, Sabrinaa; * | Foresti, Saraa | Jajodia, Sushilb | Paraboschi, Stefanoc | Samarati, Pierangelaa
Affiliations: [a] Dipartimento di Informatica, Università degli Studi di Milano, 26013 Crema, Italy. E-mails: [email protected], [email protected], [email protected] | [b] Center for Secure Information Systems, George Mason University, 22030-4422 Fairfax, VA, USA. E-mail: [email protected] | [c] Dipartimento di Ingegneria Gestionale, dell’Informazione e della Produzione, Università degli Studi di Bergamo, 24044 Dalmine, Italy. E-mail: [email protected]
Correspondence: [*] Corresponding author. E-mail: [email protected].
Note: [1] A preliminary version of this paper appeared under the title “Optimizing integrity checks for join queries in the cloud,” in Proc. of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 2014 [8].
Abstract: Cloud computing is receiving massive interest from users and companies for its convenient support of scalable access to data and services. The variety and diversification of offers by cloud providers allow users to selectively adopt storage and computational services as they best suit their needs, including cost saving considerations. In such an open context, security remains a major concern, as confidentiality and integrity of data and queries over them can be at risk. In this paper, we present efficient techniques to verify the integrity of join queries computed by potentially untrusted cloud providers, while also protecting data and computation confidentiality. Our techniques support joins among multiple data sources and introduce a limited overhead in query computation, enabling also economical savings, as the ability to assess integrity increases the spectrum of offers that can be considered for performing the computation. Formal analysis and experimental evaluations confirm the effectiveness and efficiency of our solutions.
Keywords: Query integrity, distributed join, semi-join execution, verification object
DOI: 10.3233/JCS-160545
Journal: Journal of Computer Security, vol. 24, no. 3, pp. 347-378, 2016
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]