References
- S. Aulbach, T. Grust, D. Jacobs, A. Keper, and J. Rittinger, "Multi-tenant databases for software as a service: schema-mapping techniques," in Proc. of ACM SIGMOD International Conference on Management of Data, Vol. 25, 2008, pp. 1195-1206.
- M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska, "Building a database on S3," in Proc. of ACM SIGMOD International Conference on Management of Data, Vol. 18, 2008, pp. 251-264.
- C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. of ACM Symposium on Theory of Computing, Vol. 9, 2009, pp. 169-178.
- C. Curino, E. P. C. Jones, R. A. Popa, N. Malviya, E. Wu, S. R. Madden, et al, "Relational Cloud: A Database-as-a-Service for the Cloud," in Proc. of CIDR 2011, Fifth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 9-12, 2011, Online Proceedings, pp. 235-240.
- R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: Protecting confidentiality with encrypted query processing," in Proc. of ACM Symposium on Operating Systems Principles 2011, SOSP 2011, Cascais, Portugal, October, pp. 85-100.
- P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Proc. of Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, Vol. 5, pp. 223-238.
- D. Liu, "Homomorphic encryption for database querying," WO/2013/188929.
- Hacigumus, Hakan, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proc. of ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, June, 2002, pp. 216-227.
- D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symposium on Security and Privacy, 2012, pp. 44-55.
- D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. C. Rosu, and M. Steiner, "Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries," Advances in Cryptology-CRYPTO 2013, Springer Berlin Heidelberg, 2013, pp. 353-373.
- R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," Journal of Computer Security, Vol. 19, 2011, pp. 895-934. https://doi.org/10.3233/JCS-2011-0426
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," Proceedings - IEEE INFOCOM, Vol. 25, 2011, pp. 829-837.
- B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," Proceedings - IEEE INFOCOM, 2014, pp. 2112-2120.
- Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing," IEICE Transactions on Communications, Vol. E98.B, 2015, pp. 190-200. https://doi.org/10.1587/transcom.E98.B.190
- B. Dan, and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," in Proc. of The Theory of Cryptography Conference, Vol. 4392, 2006, pp. 535-554.
- B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," Vldb Journal International Journal on Very Large Data Bases, Vol. 21, 2012, pp. 333-358. https://doi.org/10.1007/s00778-011-0245-7
- R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar, "Fast range query processing with strong privacy protection for cloud computing," Pvldb, Vol. 7, 2014, pp. 1953-1964.
- S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, "Processing analytical queries over encrypted data," Proceedings of the Vldb Endowment, Vol. 6, 2013, pp. 289-300. https://doi.org/10.14778/2535573.2488336
- D. Liu, and S. W., "Nonlinear order preserving index for encrypted database query in service cloud environments," Concurrency and Computation Practice and Experience, Vol. 25, 2013, pp. 1967-1984. https://doi.org/10.1002/cpe.2992
- D. Agrawal, A. E. Abbadi, F. Emekci, A. Metwally, and S. Wang, "Secure Data Management Service on Cloud Computing Infrastructures," New Frontiers in Information and Software as Services, Springer Berlin Heidelberg, Vol. 74, 2011, pp. 57-80.
- S. Bajaj, and R. Sion, "Trusteddb: a trusted hardware based database with privacy and data confidentiality," in Proc. of SIGMOD, 2011.
- A. H. M. S. Sattar, J. Li, X. Ding, J. Liu, and M. Vincent, "A general framework for privacy preserving data publishing," Knowledge-Based Systems, Vol. 54, 2013, pp. 276-287. https://doi.org/10.1016/j.knosys.2013.09.022
- J. Li, Z. Liu, X. Chen, F. Xhafa, X. Tan, and D. S. Wong, "L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing," Knowledge-Based Systems, Vol. 79, 2015, pp. 18-26. https://doi.org/10.1016/j.knosys.2014.04.010