Synonyms
Secure third-party data management
Definition
Data outsourcing is an emerging data management paradigm in which the owner of data is no longer totally responsible for its management. Rather, a portion of data is outsourced to external providers, potentially hosted in cloud platforms, who offer data management functionalities. Secure data outsourcing is a discipline that investigates security issues associated with data outsourcing.
Historical Background
Service outsourcing is a paradigm widely used by many companies and organizations to achieve better service. The key idea is to delegate some of their business functions to external specialized service providers. A natural evolution of this paradigm is the recent emergence of data outsourcing. With this strategy, a company is no longer completely responsible for its own data management. Rather, it outsources some of its data functionalities to one or more external data management service providers (e.g., offering efficient...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science; 1995.
Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the Network and Distributed Systems Security Symposium; 2012.
Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996;43(3):431–473.
Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of the IFIP TC11/ WG11.3 14th Annual Working Conference on Database Security; 2000.
Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of the IEEE 30th International Conference on Data Engineering; 2014.
Pang H, Tan K. Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering; 2004.
Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents. IEEE Trans Knowl Data Eng. 2004;16(10):1263–78.
Carminati B, Ferrari E, Bertino E. Securing XML data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management; 2005.
Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG. Flexible authentication of XML documents. In: Proceedings of the 8th ACM Conference on Computer and Communication Security; 2001.
Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology; 2003.
Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. In: Proceedings of the 11th Annual Symposium on Network and Distributed System Security; 2004.
Narasimha M, Tsudik G. Authentication of outsourced databases using signature aggregation and chaining. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2006.
Pang H, Jain A, Ramamritham K, Tan K. Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2005.
Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2005.
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006.
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium of Security and Privacy; 2007.
Hacigümüş H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2002.
Hacigumus H, Iyer B, Li C, Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2004.
Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms. In: Lipton RJ, Dobkin DP, Jones AK, editors. Foundations of secure computation. Academic; 1978. p. 169–78.
Agrawal R, Kiernan J, Srikant R, Xu Y. Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2004.
Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy; 2000.
Goh E. Secure indexes, cryptology ePrint archive, Report 2003/216; 2003.
Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report; 2004.
Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the Applied Cryptography and Network Security Conference; 2004.
Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th Conference on Theory of Cryptography; 2007.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Carminati, B. (2018). Secure Data Outsourcing. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_328
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_328
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering