Papadopoulos et al., 2009 - Google Patents
Separating authentication from query execution in outsourced databasesPapadopoulos et al., 2009
View PDF- Document ID
- 10582257710629242024
- Author
- Papadopoulos S
- Papadias D
- Cheng W
- Tan K
- Publication year
- Publication venue
- 2009 IEEE 25th International Conference on Data Engineering
External Links
Snippet
In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients. The traditional outsourcing model (TOM) requires that the DO and the SP …
- 238000000034 method 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
- G06F17/30545—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30345—Update requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30575—Replication, distribution or synchronisation of data between databases or within a distributed database; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Xu et al. | vchain: Enabling verifiable boolean range queries over blockchain databases | |
| CN112800088B (en) | Database ciphertext retrieval system and method based on bidirectional security index | |
| Xia et al. | A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data | |
| Yang et al. | Authenticated join processing in outsourced databases | |
| Chen et al. | An efficient privacy-preserving ranked keyword search method | |
| Pang et al. | Authenticating query results in edge computing | |
| Yiu et al. | Enabling search services on outsourced private spatial data | |
| Zheng et al. | Efficient query integrity for outsourced dynamic databases | |
| Hu et al. | Private search on key-value stores with hierarchical indexes | |
| Li et al. | Towards efficient verifiable boolean search over encrypted cloud data | |
| Papadopoulos et al. | Separating authentication from query execution in outsourced databases | |
| Wang et al. | Efficient and secure storage for outsourced data: a survey | |
| Zhang et al. | Towards efficient and privacy-preserving interval skyline queries over time series data | |
| Cui et al. | Secure boolean spatial keyword query with lightweight access control in cloud environments | |
| CN116996870A (en) | Traceable and revocable decentralized CP-ABE privacy protection method and system | |
| Papadopoulos et al. | Continuous authentication on relational streams | |
| Zhou et al. | EVSS: An efficient verifiable search scheme over encrypted cloud data | |
| Mykletun et al. | Providing authentication and integrity in outsourced databases using merkle hash trees | |
| Li et al. | Authenticated Keyword Search on Large-Scale Graphs in Hybrid-Storage Blockchains | |
| Hong et al. | Query integrity verification based-on mac chain in cloud storage | |
| Ma et al. | Authenticating query results in data publishing | |
| Bu et al. | SEF: a secure, efficient, and flexible range query scheme in two-tiered sensor networks | |
| Zhao et al. | Secsky: A secure dynamic skyline query scheme with data privacy | |
| Weintraub et al. | Crowdsourced data integrity verification for key-value stores in the cloud | |
| Wang et al. | Bucket‐based authentication for outsourced databases |