2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (Ccgrid 2012) 2012
DOI: 10.1109/ccgrid.2012.117
|View full text |Cite
|
Sign up to set email alerts
|

Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies

Abstract: For cloud-based outsourcing of confidential data, various techniques based on cryptography or data-fragmentation have been proposed, each with its own tradeoff between confidentiality, performance, and the set of supported queries. However, it is complex and error-prone to select appropriate techniques to individual scenarios manually. In this paper, we present a policy-based approach consisting of a domain specific language and a policy-transformator to automatically generate scenariospecific software adapter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
2
2
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…This methodology is also applied in other publications [14,19]. However, the application domains differ significantly from the problem at hand.…”
Section: Related Workmentioning
confidence: 94%
See 3 more Smart Citations
“…This methodology is also applied in other publications [14,19]. However, the application domains differ significantly from the problem at hand.…”
Section: Related Workmentioning
confidence: 94%
“…The choice which store to add in each step depends on the benefit for adding the store (cf. line [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24]. The store's benefit is calculated by dividing the gain in key-availability ∆a by the gain in key-vulnerability ∆v that would result from adding the current bundle including the store to the solution.…”
Section: Maxavail Heuristicmentioning
confidence: 99%
See 2 more Smart Citations
“…Approaches for integrating CPIs have been proposed [7,8,45], however, further exploration of the potential of the symbiotic effects between CPIs with regard to security and performance is another interesting future research challenge.…”
Section: Key Conclusion and Future Workmentioning
confidence: 99%