1 |
C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013.
DOI
|
2 |
N. H. Yu, Z. Hao, J. J. Xu, W. M. Zhang, and C. Zhang, "Review of cloud computing security," Dianzi Xuebao (Acta Electronica Sinica), vol. 41, no. 2, pp. 371-381, 2013.
|
3 |
R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal, 2011, pp. 85-100.
|
4 |
R. A. Popa, F. H. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," in Proceedings of 2013 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2013, pp. 463-477.
|
5 |
R. A. Popa and N. Zeldovich, "Cryptographic treatment of CryptDB's adjustable join," Massachusetts Institute of Technology, Cambridge, MA, Technical Report No. MIT-CSAIL-TR-2012-006, 2012.
|
6 |
C. Curino, E. P. Jones, R. A. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishna, and N. Zeldovich, "Relational cloud: a database-as-a-service for the cloud," in Proceedings of 5th Biennial Conference on Innovation Data Systems Research (CIDR), Asilomar, CA, 2011, pp. 235-240.
|
7 |
R. A. Popa, N. Zeldovich, and H. Balakrishnan, "CryptDB: a practical encrypted relational DBMS," Massachusetts Institute of Technology, Cambridge, MA, Technical Report No. MIT-CSAIL-TR-2011-005, 2011.
|
8 |
S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, "Processing analytical queries over encrypted data," Proceedings of the VLDB Endowment, vol. 6, no. 5, pp. 289-300, 2013.
DOI
|
9 |
W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, and S. M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, Snowbird, UT, 2014, pp. 1395-1406.
|
10 |
Z. He, W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, S. M. Yiu, and E. Lo, "SDB: a secure query processing system with data interoperability," Proceedings of the VLDB Endowment, vol. 8, no. 12, pp. 1876-1879, 2015.
DOI
|
11 |
S. Bajaj and R. Sion, "Trusteddb: a trusted hardware-based database with privacy and data confidentiality," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 3, pp. 752-765, 2014.
DOI
|
12 |
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004, pp. 563-574.
|
13 |
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, WI, 2002, pp. 216-227.
|
14 |
K. Kaur, K. S. Dhindsa, and G. Singh, "Numeric to numeric encryption of databases: using 3Kdec algorithm," in Proceedings of IEEE International Advance Computing Conference, Patiala, India, 2009, pp. 1501-1505.
|
15 |
A. C. Yao, "Protocols for secure computations," in Proceedings of 23rd Annual Symposium on Foundations of Computer Science (SFCS), Chicago, IL, 1982, pp. 160-164.
|
16 |
D. Bogdanov, R. Jagomagis, and S. Laur, "A universal toolkit for cryptographically secure privacy-preserving data mining," in Pacific-Asia Workshop on Intelligence and Security Informatics. Heidelberg: Springer, 2012, pp. 112-126.
|
17 |
H. Hacigumus, B. Iyer, and S. Mehrotra, "Providing database as a service," in Proceedings of 18th International Conference on Data Engineering, San Jose, CA, 2002, pp. 29-38.
|
18 |
G. L. Xiang, X. M. Chen, P. Zhu, and J. Ma, "A method of homomorphic encryption," Wuhan University Journal of Natural Sciences, vol. 11, no. 1, pp. 181-184, 2006.
DOI
|
19 |
Z. Brakerski, C. Gentry, and S. Halevi, "Packed ciphertexts in LWE-based homomorphic encryption," in Public-Key Cryptography-PKC 2013. Heidelberg: Springer, 2013, pp. 1-13.
|
20 |
M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2010, pp. 24-43.
|
21 |
Z. Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," SIAM Journal on Computing, vol. 43, no. 2, pp. 831-871, 2014.
DOI
|
22 |
C. Gentry, A. Sahai, and B. Waters, "Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based," in Advances in Cryptology-CRYPTO 2013. Heidelberg: Springer, 2013, pp. 75-92.
|
23 |
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), Bethesda, MD, 2009, pp. 169-178.
|
24 |
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT '99. Heidelberg: Springer, 1999, pp. 223-238.
|