期刊文献+

数据库服务模式下的数据安全管理研究 被引量:6

A Survey on Secure Data Management in Database-as-Service Paradigm
下载PDF
导出
摘要 数据库服务模式下,服务提供商的不可信带来了新的数据安全管理问题:数据的保密管理和可信性管理。根据托管方式的不同,将现有研究分为两类:集中式托管方式下的安全研究和分布式托管方式下的安全研究。在集中式托管方式下,系统地阐述了关系数据库、XML数据库和文本数据库下的密文检索和数据验证问题。在分布式托管方式下,重点阐述了数据分解方法和分离的数据验证方法。通过对现有研究进行综述,指出数据库服务模式下数据安全管理面临的挑战和未来的发展方向。 In database-as-service(DAS) paradigm, the untrustedness of service providers brings new challenges of secure data management, including data confidentiality and data integrity. To ensure data security in DAS paradigm, current research can be divided into two classes: Centralized architecture and distributed architecture. Firstly, the major research in centralized architecture is discussed from three aspects: Relational databases, XML databases and text databases. Secondly, a systematic analysis is conducted in distributed architecture. Finally, the future challenges and research fields are pointed.
出处 《计算机科学与探索》 CSCD 2010年第6期481-499,共19页 Journal of Frontiers of Computer Science and Technology
基金 高等学校博士学科点专项科研基金No.708004 高等学校科技创新工程重大项目培育资金项目No.200800020001~~
关键词 数据库服务 数据库安全 密文检索 查询验证 验证数据结构 database service database security encrypted data querying query authentication authenticated data structure
  • 相关文献

参考文献46

  • 1Hacigumus H, Iyer B, Mehrotra S. Providing database as a service[C]//IEEE International Conference on Data Engineering(ICDE'02), San Jose, CA, USA, February 2002.
  • 2Li F, Hadjieleftheriouz M, Kolliosy G, et al. Dynamic authenticated index structures for outsourced databases [C]// Proceedings of ACM SIGMOD Conference (SIGMOD'06), Chicago, Illinois, USA, June 27-29, 2006: 121-132.
  • 3Chor B, Goldreich O, Kushilevitz E, et al. Private information retrieval[C]//Proceedings of the 36th Annual IEEE Conference on Foundations of Computer Science, New York, 1995: 41-50.
  • 4Miklau G, Suciu D. Controlling access to published data using cryptography[C]//Proceedings of International Con ference on Very Large Data Bases(VLDB'03), Berlin, Germany, 2003.
  • 5Kantarcioglu M, Clifton C. Security issues in querying encrypted data[R]. Purdue University, 2004.
  • 6Agrawal R, Kierman J, Srikant R, et al. Order preserving encryption for numeric data[C]//Proceedings of ACM SIGMOD Conference(SIGMOD'04), Paris, France, June 2004.
  • 7Sweeney L. K-anonymity: A model for protecting privacy[J]. International Journal on Uncertain, Fuzziness and Knowledge-based System, 2002, 10(5): 557-570.
  • 8Pfleeger C P, Pfleeger S L. Security in computing[M]. 4th ed. Beijing: Publishing House of Electronics Industry, 2007.
  • 9Wang H, Lakshmanan L. Efficient secure query evaluation over encrypted XML databases[C]//Proceedings of International Conference on Very Large Data Bases (VLDB'06), September 2006.
  • 10Ozsoyoglu G, Singer D A, Chung S S. Anti-tamper data- bases: Querying encrypted databases[C]//Proeeedings of the 17th Annual IFIP WG 11.3 Working Conference on Data and Applications Security(DBSec'03), Estes Park, Colorado, August 2003.

同被引文献76

  • 1杜小勇.互联网时代的数据管理技术[J].中国传媒科技,2006(2):40-41. 被引量:2
  • 2Aulbach S, Grust T, Jacobs D, et al. Multi-tenant databases for software as a service: schema-mapping techniques[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, 2008. New York, NY, USA: ACM, 2008: 1195-1206.
  • 3Sion R. Query execution assurance for outsourced databases[C]//Proceedings of the 31st International Confer- ence on Very Large Data Bases (VLDB'05), 2005: 601-612.
  • 4Hui M, Jiang D, Li G, et al. Supporting database application as a service[C]//Proceedings of the IEEE International Conference on Data Engineering (ICDE'09). Washington, DC, USA: IEEE Computer Society, 2008: 832-843.
  • 5Hacigumus H, Iyer B, Mehrotra S. Providing database as a service[C]//Proceedings of the IEEE International Conference on Data Engineering (ICDE'02). Washington, DC, USA: IEEE Computer Society, 2002: 29-30.
  • 6Chan C Y, Eng P K, Tan K L. Stratified computation of skylines with partially-ordered domains[C]//Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, 2005. New York, NY, USA: ACM, 2005: 203-214.
  • 7Li C, Ooi B, Tuang A, et al. Dada: a data cube for dominant relationship analysis[C]//Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, 2006. New York, NY, USA: ACM, 2006: 659-670.
  • 8Agrawal R, Somani A, Xu Y. Storage and querying of E-commerce data[C]//Proceedings of the 27th International Conference on Very Large Data Bases (VLDB'01), 2001: 149-158.
  • 9Singh A, Liu L. SHAROES: a data sharing platform for outsourced enterprise storage environments[C]//Proceedings of the IEEE International Conference on Data Engineering (ICDE'08). Washington, DC, USA: IEEE Computer Society, 2008: 993-1002.
  • 10Anderson C. The long tail[M]. [S.1.]: The Hyperion Press, 2006.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部