2008
DOI: 10.1145/1374780.1374783
|View full text |Cite
|
Sign up to set email alerts
|

A survey on querying encrypted XML documents for databases as a service

Abstract: Database as a service" paradigm has gained a lot of interest in recent years. This has raised questions about the security of data in the servers. Firms outsourcing their XML databases to untrusted parties started to look for new ways to securely store data and efficiently query them. In this paper, encrypted XML documents, their crypto index structures and query processing using these structures are investigated. A comparison of various algorithms in the literature is given.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…However, since each path is encoded independently, the server cannot process TPQ, which contains multiple correlated paths. Interested readers can refer to [21] for a more complete survey about outsourcing of XML documents.…”
Section: Related Workmentioning
confidence: 99%
“…However, since each path is encoded independently, the server cannot process TPQ, which contains multiple correlated paths. Interested readers can refer to [21] for a more complete survey about outsourcing of XML documents.…”
Section: Related Workmentioning
confidence: 99%
“…The first column is the key name. The second column is element name, and the third is the occurrences, which is expressed as the Dewey number of elements in the second column [6]. All three columns are encrypted using the keys in the first column.…”
Section: Index Informationmentioning
confidence: 99%
“…The field occurrences of the row associated with element type "Issuer", which is requested in the query, is decrypted by the processor [5,6]. The position of element type "Issuer" is at the node with number 1.1.2.2, and encrypted data element is included in the node with Dewey number 1.1.2 [5,6]. The node with Dewey number 1.1.2 is returned and decrypted.…”
Section: Index Informationmentioning
confidence: 99%
“…There are other security issues in outsourcing database models that are orthogonal to our problem, for example, secure releasing of outsourced XML databases [22], enforcing access control policies on published XML documents [3], [15], and querying encrypted outsourced XML databases (we refer the readers to [21] for a survey of this topic).…”
Section: Related Workmentioning
confidence: 99%