Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure query processing in untrusted...
~
Choi, Sunoh.
Linked to FindBook
Google Book
Amazon
博客來
Secure query processing in untrusted cloud environments.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Secure query processing in untrusted cloud environments./
Author:
Choi, Sunoh.
Description:
166 p.
Notes:
Source: Dissertation Abstracts International, Volume: 76-01(E), Section: B.
Contained By:
Dissertation Abstracts International76-01B(E).
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3635814
ISBN:
9781321171389
Secure query processing in untrusted cloud environments.
Choi, Sunoh.
Secure query processing in untrusted cloud environments.
- 166 p.
Source: Dissertation Abstracts International, Volume: 76-01(E), Section: B.
Thesis (Ph.D.)--Purdue University, 2014.
This item must not be sold to any third party vendors.
Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to find the adversary and get a correct result by removing the adversary.
ISBN: 9781321171389Subjects--Topical Terms:
1669061
Engineering, Computer.
Secure query processing in untrusted cloud environments.
LDR
:02697nmm a2200301 4500
001
2056386
005
20150526083646.5
008
170521s2014 ||||||||||||||||| ||eng d
020
$a
9781321171389
035
$a
(MiAaPQ)AAI3635814
035
$a
AAI3635814
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Choi, Sunoh.
$3
3170140
245
1 0
$a
Secure query processing in untrusted cloud environments.
300
$a
166 p.
500
$a
Source: Dissertation Abstracts International, Volume: 76-01(E), Section: B.
500
$a
Adviser: Elisa Bertino.
502
$a
Thesis (Ph.D.)--Purdue University, 2014.
506
$a
This item must not be sold to any third party vendors.
520
$a
Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to find the adversary and get a correct result by removing the adversary.
520
$a
To address these challenges, we propose several schemes. First, with respect to secure kNN query processing and secure proximity detection, we give novel schemes based on Mutable Order Preserving Encryption (MOPE) and Secure Point Evaluation Method (SPEM). Second, for authenticated top-k aggregation, we suggest novel schemes using Three Phase Uniform Threshold Algorithm, Merkle Hash Tree, and Condensed-RSA. Third, for detecting malicious nodes, we propose novel algorithms based on Additively Homomorphic Encryption and Multipath Transmission. Our experimental evaluation and security analyses demonstrate that robust mechanisms can be deployed with a minimal amount of computational and communicational expense.
590
$a
School code: 0183.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
Purdue University.
$b
Electrical and Computer Engineering.
$3
1018497
773
0
$t
Dissertation Abstracts International
$g
76-01B(E).
790
$a
0183
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3635814
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9288875
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login