+

Papadopoulos et al., 2009 - Google Patents

Separating authentication from query execution in outsourced databases

Papadopoulos et al., 2009

View PDF
Document ID
10582257710629242024
Author
Papadopoulos S
Papadias D
Cheng W
Tan K
Publication year
Publication venue
2009 IEEE 25th International Conference on Data Engineering

External Links

Snippet

In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients. The traditional outsourcing model (TOM) requires that the DO and the SP …
Continue reading at cse.hkust.edu.hk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • G06F17/30545Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30345Update requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30575Replication, distribution or synchronisation of data between databases or within a distributed database; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes

Similar Documents

Publication Publication Date Title
Xu et al. vchain: Enabling verifiable boolean range queries over blockchain databases
CN112800088B (en) Database ciphertext retrieval system and method based on bidirectional security index
Xia et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
Yang et al. Authenticated join processing in outsourced databases
Chen et al. An efficient privacy-preserving ranked keyword search method
Pang et al. Authenticating query results in edge computing
Yiu et al. Enabling search services on outsourced private spatial data
Zheng et al. Efficient query integrity for outsourced dynamic databases
Hu et al. Private search on key-value stores with hierarchical indexes
Li et al. Towards efficient verifiable boolean search over encrypted cloud data
Papadopoulos et al. Separating authentication from query execution in outsourced databases
Wang et al. Efficient and secure storage for outsourced data: a survey
Zhang et al. Towards efficient and privacy-preserving interval skyline queries over time series data
Cui et al. Secure boolean spatial keyword query with lightweight access control in cloud environments
CN116996870A (en) Traceable and revocable decentralized CP-ABE privacy protection method and system
Papadopoulos et al. Continuous authentication on relational streams
Zhou et al. EVSS: An efficient verifiable search scheme over encrypted cloud data
Mykletun et al. Providing authentication and integrity in outsourced databases using merkle hash trees
Li et al. Authenticated Keyword Search on Large-Scale Graphs in Hybrid-Storage Blockchains
Hong et al. Query integrity verification based-on mac chain in cloud storage
Ma et al. Authenticating query results in data publishing
Bu et al. SEF: a secure, efficient, and flexible range query scheme in two-tiered sensor networks
Zhao et al. Secsky: A secure dynamic skyline query scheme with data privacy
Weintraub et al. Crowdsourced data integrity verification for key-value stores in the cloud
Wang et al. Bucket‐based authentication for outsourced databases
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载