2017 IEEE 33rd International Conference on Data Engineering (ICDE) 2017
DOI: 10.1109/icde.2017.125
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Query Processing over Hybrid Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
34
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 23 publications
(36 citation statements)
references
References 21 publications
1
34
0
1
Order By: Relevance
“…Work closest to ours has addressed the problem of protecting data confidentiality in distributed computations (e.g., [8,18,24]). In [24] the authors present an approach to collaboratively execute queries on data subject to access restrictions, considering different join evaluation strategies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Work closest to ours has addressed the problem of protecting data confidentiality in distributed computations (e.g., [8,18,24]). In [24] the authors present an approach to collaboratively execute queries on data subject to access restrictions, considering different join evaluation strategies.…”
Section: Related Workmentioning
confidence: 99%
“…In [8] the authors provide a solution for restricting access and sharing of distributed data, which supports the explicit consideration of join paths in the authorizations. The proposal in [18] aims to protect computations in hybrid clouds, preventing flows of sensitive information to the public cloud. These works confirm the relevance of the problem, but focus on different aspects.…”
Section: Related Workmentioning
confidence: 99%
“…The discussion above focused on partitioned computing in hybrid clouds in the context of SQL queries and is based primarily on the work that appeared in [37]. Several other approaches to partitioned computing in the hybrid cloud have also been developed in the literature that, similar to the above-mentioned method, offer security by controlling data distribution between private and public clouds.…”
Section: Other Approaches To Partitioned Computingmentioning
confidence: 99%
“…Given the state of the research, this paper explores a radically different approach to secure outsourcing that scales cryptographic mechanisms using database techniques while providing strong security guarantees. Our work is motivated by recent works on the hybrid cloud that has exploited the fact that for a large class of application contexts, data can be partitioned into sensitive and non-sensitive components [22]- [24]. Such a classification, which is common in industries for secure computing [25], [26] and done via appropriately using existing techniques surveyed in [27]; for example, (i) inference detection using graph-based semantic data modeling [28], (ii) user-defined relationships between sensitive and non-sensitive data [29], (iii) constraints-based mechanisms, (iv) sensitive patterns hiding using sanitization matrix [30], and (v) common knowledge-based association rules [31].…”
Section: Introductionmentioning
confidence: 99%