Skip to main content

Secure Computation on Outsourced Data: A 10-year Retrospective

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8421))

Included in the following conference series:

  • 1731 Accesses

Abstract

This paper outlines the “behind the scene” story of how we wrote the DASFAA 2004 paper on secure computation on outsourced data to support SQL aggregation queries. We then describe some of the research we have done following the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535–552. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Canim, M., Kantarcioglu, M., Hore, B., Mehrotra, S.: Building disclosure risk aware query optimizers for relational databases. PVLDB 3(1) (2010)

    Google Scholar 

  4. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proc. of ACM CCS (2006)

    Google Scholar 

  5. Gentry, C.: A Fully Homomorphic Encryption Scheme. Ph.D. Thesis, Stanford University (2009)

    Google Scholar 

  6. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC (2009)

    Google Scholar 

  7. Hacıgümüş, H.: Privacy in Database-as-a-Service Model. Ph.D. Thesis, Department of Information and Computer Science, University of California, Irvine (2003)

    Google Scholar 

  8. Hacıgümüş, H.: NEC Labs Data Management Research. SIGMOD Record 40(3) (2011)

    Google Scholar 

  9. Hacıgümüş, H., Hore, B., Iyer, B.R., Mehrotra, S.: Search on encrypted data. In: Secure Data Management in Decentralized Systems, pp. 383–425 (2007)

    Google Scholar 

  10. Hacıgümüş, H., Iyer, B., Mehrotra, S.: Query Optimization in Encrypted Database Systems. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 43–55. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Hacıgümüş, H., Mehrotra, S.: Performance-Conscious Key Management in Encrypted Databases. In: Proc. of DBSec (2004)

    Google Scholar 

  12. Hacıgümüş, H., Mehrotra, S.: Efficient Key Updates in Encrypted Database Systems. In: Proc. of DBSec (2005)

    Google Scholar 

  13. Hore, B., Mehrotra, S., Hacıgümüş: Managing and querying encrypted data. In: Handbook of Database Security, pp. 163–190 (2008)

    Google Scholar 

  14. Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. of VLDB (2004)

    Google Scholar 

  15. Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A Framework for Efficient Storage Security in RDBMS. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 147–164. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: gvault: A gmail based cryptographic network file system. In: Proc. of DBSec (2007)

    Google Scholar 

  17. Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: idataguard: middleware providing a secure network drive interface to untrusted internet data storage. In: Proc. of EDBT (2008)

    Google Scholar 

  18. Jammalamadaka, R.C., Gamboni, R., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: A middleware approach for outsourcing data securely. Computers & Security 32 (2013)

    Google Scholar 

  19. Jammalamadaka, R.C., Mehrotra, S., Venkatasubramanian, N.: Pvault: a client server system providing mobile access to personal data. In: Proc. of StorageSS (2005)

    Google Scholar 

  20. Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K.E., Venkatasubramanian, N.: Delegate: A proxy based architecture for secure website access from an untrusted machine. In: Proc. of ACSAC (2006)

    Google Scholar 

  21. Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security (2012)

    Google Scholar 

  22. Khadilkar, V., Oktay, K.Y., Kantarcioglu, M., Mehrotra, S.: Secure data processing over hybrid clouds. IEEE Data Eng. Bull. 35(4) (2012)

    Google Scholar 

  23. Oktay, K.Y., Khadilkar, V., Hore, B., Kantarcioglu, M., Mehrotra, S., Thuraisingham, B.M.: Risk-aware workload distribution in hybrid clouds. In: IEEE CLOUD (2012)

    Google Scholar 

  24. Oktay, K.Y., Khadilkar, V., Kantarcioglu, M., Mehrotra, S.: Risk aware approach to data confidentiality in cloud computing. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 27–42. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  25. Pattuk, E., Kantarcioglu, M., Khadilkar, V., Ulusoy, H., Mehrotra, S.: Bigsecret: A secure data management framework for key-value stores. In: Proc. of IEEE CLOUD (2013)

    Google Scholar 

  26. Rivest, R.L., Adleman, L.M., Dertouzos, M.: On Data Banks and Privacy Homomorphisms. In: Foundations of Secure Computation (1978)

    Google Scholar 

  27. van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. IACR Cryptology ePrint Archive (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hacıgümüş, H., Iyer, B., Mehrotra, S. (2014). Secure Computation on Outsourced Data: A 10-year Retrospective. In: Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (eds) Database Systems for Advanced Applications. DASFAA 2014. Lecture Notes in Computer Science, vol 8421. Springer, Cham. https://doi.org/10.1007/978-3-319-05810-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05810-8_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05809-2

  • Online ISBN: 978-3-319-05810-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics