1 |
J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu and R. Buyya, "Ensuring security and privacy preservation for cloud data services," ACM Computing Surveys (CSUR), vol. 49, no. 1, pp. 13, 2016.
|
2 |
F. A. Aljumah, Protocols for Secure Computation on Privately Encrypted Data in the Cloud, Doctoral dissertation, Concordia University, Canada, 2017.
|
3 |
C. Sahin and A. El Abbadi, "Data security and privacy for outsourced data in the cloud," in Proc. of IEEE 34th International Conference on Data Engineering (ICDE), pp. 1731-1734, 2018.
|
4 |
L. Bouganim and Y. Guo, Database encryption. Encyclopedia of Cryptography and, 2nd Edition, Springer US, pp. 307-312, 2011.
|
5 |
P. Singh and K. Kaur, "Database security using encryption," in Proc. of IEEE International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), pp. 353-358, February, 2015.
|
6 |
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. of the forty-first annual ACM symposium on Theory of computing, pp. 169-178, May, 2009.
|
7 |
R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
DOI
|
8 |
A. C. Yao, "Protocols for secure computations," in Proc. of 23rd annual symposium on foundations of computer science, pp. 160-164, November, 1982.
|
9 |
W. K. Wong, B. Kao, D. W. L. Cheung, R. Li and S. M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in Proc. of the 2014 ACM SIGMOD international conference on Management of data, pp. 1395-1406, June, 2014.
|
10 |
H. Hacigumus, B. Iyer, C. Li and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proc. of the 2002 ACM SIGMOD international conference on Management of data, pp. 216-227, June, 2002.
|
11 |
E. Mykletun and G. Tsudik, "Aggregation queries in the database-as-a-service model," in Proc. of the annual conference on data and applications security and privacy, pp. 89-103, July, 2006.
|
12 |
K. G. Ho, L. Vu, N. H. Nguyen and H. M. Nguyen, "Speed up querying encrypted data on outsourced database," in Proc. of the 2017 International Conference on Machine Learning and Soft Computing, pp. 47-52, 2017.
|
13 |
R. A. Popa, C. Redfield, N. Zeldovich and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85-100, October, 2011.
|
14 |
S. Tu, M. Kaashoek, S. Madden and N. Zeldovich, "Processing analytical queries over encrypted data," in Proc. of the VLDB Endowment, pp. 289-300, March, 2013.
|
15 |
Z. He, W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, S. M. Yiu and E. Lo, "SDB: a secure query processing system with data interoperability," in Proc. of the VLDB Endowment, vol. 8, no. 12, pp. 1876-1879, 2015.
DOI
|
16 |
P. G. Alves and D. F. Aranha, "A framework for searching encrypted databases," Journal of Internet Services and Applications, vol. 9, no. 1, pp. 1, 2018.
DOI
|
17 |
Y. Zhou and L. M. Wang, "Sds2: Secure data-sharing scheme for crowd owners in public cloud service," in Proc. of the IEEE Second International Conference on Data Science in Cyberspace (DSC), pp. 22-29, June, 2017.
|
18 |
S. S. Moghadam, J. Darmont and G. Gavin, "Enforcing privacy in cloud databases," in Proc. of the International Conference on Big Data Analytics and Knowledge Discovery, pp. 53-73, August, 2017.
|
19 |
T. K. Saha, M. Rathee and T. Koshiba, "Efficient private database queries using ring-LWE somewhat homomorphic encryption," Journal of Information Security and Applications, vol. 49, no. 1, 2019.
|
20 |
R. Pontes, M. Pinto, M. Barbosa, R. Vilaca, M. Matos and R. Oliveira, "Performance trade-offs on a secure multi-party relational database," in Proc. of the Symposium on Applied Computing, pp. 456-461, April 2017.
|
21 |
V. Attasena, N. Harbi and J. Darmont, "A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud," International Journal of Data Warehousing and Mining (IJDWM), vol. 11, no. 2, pp. 22-43, 2015.
DOI
|
22 |
M. He, J. Zhang, G. Zeng and S. M. Yiu, "A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database," in Proc. of the 15th Annual Conference on Privacy, Security and Trust (PST), pp. 293-299, August 2017.
|
23 |
B. Wang, S. Yu, W. Lou and Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc. of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 2112-2120, April 2014.
|
24 |
D. Wang, X. Jia, C. Wang, K. Yang, S. Fu and M. Xu, "Generalized pattern matching string search on encrypted data in cloud systems," in Proc. of the IEEE Conference on Computer Communications (INFOCOM), pp. 2101-2109, April, 2015.
|
25 |
Z. Liu, J. Li, C. Jia, J. Yang and K. Yuan, "SQL-based fuzzy query mechanism over encrypted database," International Journal of Data Warehousing and Mining (IJDWM), vol. 10, no. 4, pp. 71-87, 2014.
DOI
|
26 |
Z. Wu, G. Xu, C. Lu, E. Chen, F. Jiang and G. Li, "An effective approach for the protection of privacy text data in the CloudDB," World Wide Web, vol. 21, no. 4, pp. 915-938, 2018.
DOI
|
27 |
W. Tang, B. Qin, Y. Li and Q. Wu, "Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing," KSII Transactions on Internet & Information Systems, vol. 14, no. 1, pp. 281-298, 2020.
DOI
|
28 |
S. Papadopoulos, A. Kiayias and D. Papadias, "Secure and efficient in-network processing of exact SUM queries," in Proc. of the 27th International Conference on Data Engineering, pp. 517-528, April, 2011.
|
29 |
S. Fatima and S. Ahmad, "An Exhaustive Review on Security Issues in Cloud Computing," KSII Transactions on Internet & Information Systems, vol. 13, no. 6, pp. 3219-3237, 2019.
DOI
|
30 |
J. Hua, Y. Liu, H. Chen, X. Tian and C. Jin, "An enhanced wildcard-based fuzzy searching scheme in encrypted databases," World Wide Web, vol. 23, pp. 2185-2214, 2020.
DOI
|