2013
DOI: 10.1007/978-3-642-35890-6_15
|View full text |Cite
|
Sign up to set email alerts
|

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing

Abstract: Abstract.Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the "Database As a Service" model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir's secret sharing scheme. We split attribute… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(25 citation statements)
references
References 16 publications
(15 reference statements)
0
25
0
Order By: Relevance
“…Finally, up to n − k participants may disappear without compromising data availability; and message authentication code or signature can be applied to guarantee data integrity. Thus, secret sharing is a promising solution to security challenges in cloud data outsourcing [35] since one can easily imagine participants being CSPs. In the following subsections, we review the secret sharing-based approaches that aim at outsourcing databases, and then discuss them globally.…”
Section: Secret Sharing-based Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…Finally, up to n − k participants may disappear without compromising data availability; and message authentication code or signature can be applied to guarantee data integrity. Thus, secret sharing is a promising solution to security challenges in cloud data outsourcing [35] since one can easily imagine participants being CSPs. In the following subsections, we review the secret sharing-based approaches that aim at outsourcing databases, and then discuss them globally.…”
Section: Secret Sharing-based Methodsmentioning
confidence: 99%
“…Moreover, intrinsically sensitive attributes such as social security numbers are stored locally at the user's. Eventually, fragmentation-based approaches yield little overhead on query computation, but are vulnerable in cases of CSP collusion and CSP inference on data updates [35]. Additionally, retaining sensitive data at the user's requires local storage capacities, which is incompatible with our data outsourcing scenario.…”
Section: Data Fragmentationmentioning
confidence: 99%
See 3 more Smart Citations