Access the full text.
Sign up today, get DeepDyve free for 14 days.
Miguel Felipe, Khin Aung, Xia Ye, Yonggang Wen (2015)
StealthyCRM: A Secure Cloud CRM System Application that Supports Fully Homomorphic Database Encryption2015 International Conference on Cloud Computing Research and Innovation (ICCCRI)
R. Popa, Catherine Redfield, N. Zeldovich, H. Balakrishnan (2011)
CryptDB: protecting confidentiality with encrypted query processingProceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Qiang Guan, Ziming Zhang, Song Fu (2011)
Proactive Failure Management by Integrated Unsupervised and Semi-Supervised Learning for Dependable Cloud Systems2011 Sixth International Conference on Availability, Reliability and Security
Rodel Miguel, Akankshita Dash, Khin Aung (2016)
A study of secure DBaaS with encrypted data transactionsProceedings of the 2nd International Conference on Communication and Information Processing
A. Juels, B. Kaliski (2007)
Pors: proofs of retrievability for large filesIACR Cryptol. ePrint Arch., 2007
Paul Grubbs, R. McPherson, Muhammad Naveed, T. Ristenpart, Vitaly Shmatikov (2016)
Breaking Web Applications Built On Top of Encrypted DataProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
R. Sandhu, E. Coyne, H. Feinstein, C. Youman (1996)
Role-Based Access Control ModelsComputer, 29
A. Sahai, Brent Waters (2005)
Fuzzy Identity-Based Encryption
Chun-Ting Huang, Lei Huang, Zhongyuan Qin, Hang Yuan, Lan Zhou, V. Varadharajan, C.-C. Kuo (2014)
Survey on securing data storage in the cloudAPSIPA Transactions on Signal and Information Processing, 3
Mark Lillibridge, S. Elnikety, A. Birrell, M. Burrows, M. Isard (2003)
USENIX Association Proceedings of the General Track : 2003 USENIX Annual
M. Egorov, M. Wilkison (2016)
ZeroDB white paperArXiv, abs/1602.07168
T. Ristenpart, Scott Yilek (2010)
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Paul Grubbs, T. Ristenpart, Vitaly Shmatikov (2017)
Why Your Encrypted Database Is Not SecureProceedings of the 16th Workshop on Hot Topics in Operating Systems
Ayantika Chatterjee, I. Sengupta (2018)
Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the CloudIEEE Transactions on Cloud Computing, 6
Ashutosh Saxena, Ashutosh Saxena (2011)
Data integrity proofs in cloud storage2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)
D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano (2004)
Public Key Encryption with Keyword Search
Allison Bishop, T. Okamoto, A. Sahai, K. Takashima, Brent Waters (2010)
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Marco Balduzzi, Jonas Zaddach, D. Balzarotti, E. Kirda, Sergio Loureiro (2012)
A security analysis of Amazon's Elastic Compute Cloud serviceIEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)
Ayantika Chatterjee, M. Kaushal, I. Sengupta (2013)
Accelerating Sorting of Fully Homomorphic Encrypted Data
M. Storer, K. Greenan, D. Long, E. Miller (2008)
Secure data deduplication
Gail-Joon Ahn, R. Sandhu (2000)
Role-based authorization constraints specificationACM Trans. Inf. Syst. Secur., 3
[Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services. Enterprises and Small-to-Medium Businesses (SMB) see this as a roadblock in adopting cloud services because they do not have full control of the security of the stored data on the cloud. Due to these security issues, one possible solution for the data owners is to store their sensitive data in encrypted form. However, to take full advantage of cloud database as service, FHE enabled SQL processing is a promising solution, which will be elaborated in this chapter.]
Published: Mar 30, 2019
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.