Abstract
This paper outlines the “behind the scene” story of how we wrote the DASFAA 2004 paper on secure computation on outsourced data to support SQL aggregation queries. We then describe some of the research we have done following the paper.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)
Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)
Canim, M., Kantarcioglu, M., Hore, B., Mehrotra, S.: Building disclosure risk aware query optimizers for relational databases. PVLDB 3(1) (2010)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proc. of ACM CCS (2006)
Gentry, C.: A Fully Homomorphic Encryption Scheme. Ph.D. Thesis, Stanford University (2009)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC (2009)
Hacıgümüş, H.: Privacy in Database-as-a-Service Model. Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine (2003)
Hacıgümüş, H.: NEC Labs Data Management Research. SIGMOD Record 40(3) (2011)
Hacıgümüş, H., Hore, B., Iyer, B.R., Mehrotra, S.: Search on encrypted data. In: Secure Data Management in Decentralized Systems, pp. 383–425 (2007)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Query Optimization in Encrypted Database Systems. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 43–55. Springer, Heidelberg (2005)
Hacıgümüş, H., Mehrotra, S.: Performance-Conscious Key Management in Encrypted Databases. In: Proc. of DBSec (2004)
Hacıgümüş, H., Mehrotra, S.: Efficient Key Updates in Encrypted Database Systems. In: Proc. of DBSec (2005)
Hore, B., Mehrotra, S., Hacıgümüş: Managing and querying encrypted data. In: Handbook of Database Security, pp. 163–190 (2008)
Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. of VLDB (2004)
Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A Framework for Efficient Storage Security in RDBMS. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 147–164. Springer, Heidelberg (2004)
Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: gvault: A gmail based cryptographic network file system. In: Proc. of DBSec (2007)
Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: idataguard: middleware providing a secure network drive interface to untrusted internet data storage. In: Proc. of EDBT (2008)
Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: A middleware approach for outsourcing data securely. Computers & Security 32 (2013)
Jammalamadaka, R.C., Mehrotra, S., Venkatasubramanian, N.: Pvault: a client server system providing mobile access to personal data. In: Proc. of StorageSS (2005)
Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: Delegate: A proxy based architecture for secure website access from an untrusted machine. In: Proc. of ACSAC (2006)
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security (2012)
Khadilkar, V., Oktay, K.Y., Kantarcioglu, M., Mehrotra, S.: Secure data processing over hybrid clouds. IEEE Data Eng. Bull. 35(4) (2012)
Oktay, K.Y., Khadilkar, V., Hore, B., Kantarcioglu, M., Mehrotra, S., Thuraisingham, B.M.: Risk-aware workload distribution in hybrid clouds. In: IEEE CLOUD (2012)
Oktay, K.Y., Khadilkar, V., Kantarcioglu, M., Mehrotra, S.: Risk aware approach to data confidentiality in cloud computing. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 27–42. Springer, Heidelberg (2013)
Pattuk, E., Kantarcioglu, M., Khadilkar, V., Ulusoy, H., Mehrotra, S.: Bigsecret: A secure data management framework for key-value stores. In: Proc. of IEEE CLOUD (2013)
Rivest, R.L., Adleman, L.M., Dertouzos, M.: On Data Banks and Privacy Homomorphisms. In: Foundations of Secure Computation (1978)
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. IACR Cryptology ePrint Archive (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hacıgümüş, H., Iyer, B., Mehrotra, S. (2014). Secure Computation on Outsourced Data: A 10-year Retrospective. In: Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (eds) Database Systems for Advanced Applications. DASFAA 2014. Lecture Notes in Computer Science, vol 8421. Springer, Cham. https://doi.org/10.1007/978-3-319-05810-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-05810-8_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05809-2
Online ISBN: 978-3-319-05810-8
eBook Packages: Computer ScienceComputer Science (R0)