語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Secure query processing in untrusted...
~
Choi, Sunoh.
FindBook
Google Book
Amazon
博客來
Secure query processing in untrusted cloud environments.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Secure query processing in untrusted cloud environments./
作者:
Choi, Sunoh.
面頁冊數:
166 p.
附註:
Source: Dissertation Abstracts International, Volume: 76-01(E), Section: B.
Contained By:
Dissertation Abstracts International76-01B(E).
標題:
Engineering, Computer. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3635814
ISBN:
9781321171389
Secure query processing in untrusted cloud environments.
Choi, Sunoh.
Secure query processing in untrusted cloud environments.
- 166 p.
Source: Dissertation Abstracts International, Volume: 76-01(E), Section: B.
Thesis (Ph.D.)--Purdue University, 2014.
This item must not be sold to any third party vendors.
Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to find the adversary and get a correct result by removing the adversary.
ISBN: 9781321171389Subjects--Topical Terms:
1669061
Engineering, Computer.
Secure query processing in untrusted cloud environments.
LDR
:02697nmm a2200301 4500
001
2056386
005
20150526083646.5
008
170521s2014 ||||||||||||||||| ||eng d
020
$a
9781321171389
035
$a
(MiAaPQ)AAI3635814
035
$a
AAI3635814
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Choi, Sunoh.
$3
3170140
245
1 0
$a
Secure query processing in untrusted cloud environments.
300
$a
166 p.
500
$a
Source: Dissertation Abstracts International, Volume: 76-01(E), Section: B.
500
$a
Adviser: Elisa Bertino.
502
$a
Thesis (Ph.D.)--Purdue University, 2014.
506
$a
This item must not be sold to any third party vendors.
520
$a
Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to find the adversary and get a correct result by removing the adversary.
520
$a
To address these challenges, we propose several schemes. First, with respect to secure kNN query processing and secure proximity detection, we give novel schemes based on Mutable Order Preserving Encryption (MOPE) and Secure Point Evaluation Method (SPEM). Second, for authenticated top-k aggregation, we suggest novel schemes using Three Phase Uniform Threshold Algorithm, Merkle Hash Tree, and Condensed-RSA. Third, for detecting malicious nodes, we propose novel algorithms based on Additively Homomorphic Encryption and Multipath Transmission. Our experimental evaluation and security analyses demonstrate that robust mechanisms can be deployed with a minimal amount of computational and communicational expense.
590
$a
School code: 0183.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0984
710
2
$a
Purdue University.
$b
Electrical and Computer Engineering.
$3
1018497
773
0
$t
Dissertation Abstracts International
$g
76-01B(E).
790
$a
0183
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3635814
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9288875
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入