Xie et al., 2007 - Google Patents
Integrity Auditing of Outsourced Data.Xie et al., 2007
View PDF- Document ID
- 241887541499712641
- Author
- Xie M
- Wang H
- Yin J
- Meng X
- Publication year
- Publication venue
- VLDB
External Links
Snippet
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is a major concern in outsourcing. In particular, query integrity, which means that query results returned …
- 238000009826 distribution 0 description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
- G06Q10/1053—Employment or hiring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
- G06Q10/063112—Skill-based matching of a person or a group to a task
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xie et al. | Integrity Auditing of Outsourced Data. | |
Li et al. | Dynamic authenticated index structures for outsourced databases | |
Yang et al. | Authenticated join processing in outsourced databases | |
Sun et al. | Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking | |
Yang et al. | Privacy-preserving queries on encrypted data | |
Ge et al. | Answering aggregation queries in a secure system model | |
Kundu et al. | Structural signatures for tree data structures | |
Vimercati et al. | Encryption policies for regulating access to outsourced data | |
Papadopoulos et al. | Taking authenticated range queries to arbitrary dimensions | |
Yun et al. | On protecting integrity and confidentiality of cryptographic file system for outsourced storage | |
Papamanthou et al. | Time and space efficient algorithms for two-party authenticated data structures | |
Xie et al. | Providing freshness guarantees for outsourced databases | |
Pang et al. | Verifying completeness of relational query answers from online servers | |
Li et al. | Integrity-verifiable conjunctive keyword searchable encryption in cloud storage | |
Ghazizadeh et al. | Data integrity evaluation in cloud database-as-a-service | |
Papadopoulos et al. | Practical authenticated pattern matching with optimal proof size | |
Guo et al. | Forward private verifiable dynamic searchable symmetric encryption with efficient conjunctive query | |
Wang et al. | vChain: a blockchain system ensuring query integrity | |
Di Battista et al. | Authenticated relational tables and authenticated skip lists | |
Goodrich et al. | Efficient verification of web-content searching through authenticated web crawlers | |
Tang et al. | Lightweight authentication of freshness in outsourced key-value stores | |
Heitzmann et al. | Efficient integrity checking of untrusted network storage | |
Fugkeaw et al. | Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse | |
Zhou et al. | EVSS: An efficient verifiable search scheme over encrypted cloud data | |
Wei et al. | Integrity assurance for outsourced databases without DBMS modification |