期刊文献+

微观数据外包管理中的安全问题研究进展

Research progress on security in micro data outsourcing scenario
下载PDF
导出
摘要 详细剖析了微观数据外包管理中的安全问题内涵,系统评述了微观数据外包管理应用系统数据机密性保护、查询验证、隐私保护等安全问题的研究进展,最后探讨了微观数据外包管理安全问题研究的发展趋势。 This paper introduced the implication of security in database outsourcing scenario,addressed the progress in privacy preserving,data confidentiality,and so on,analyzed the opening issue in this area.
出处 《计算机应用研究》 CSCD 北大核心 2011年第8期2812-2816,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61070131) 国家教育部人文社科青年项目(09YJC870001) 安徽高校省级自然科学研究重大资助项目(KJ2010ZD01)
关键词 数据外包 查询验证 隐私保护 数据库版权 outsourcing data query authentication privacy preserving database ownership
  • 相关文献

参考文献40

  • 1HACIGUMUS H, IYER B, MEHROTRA S. Providing database as a dervice[ C ]//Proc of the 1 $th International Conference on Data Engi- neering. 2002:29-38.
  • 2朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 3SION R. Towards secure data outsourcing [ M ]. [ S. 1. ] : Springer Verlag,2008 : 137-161.
  • 4孟小峰,周龙骧,王珊.数据库技术发展趋势[J].软件学报,2004,15(12):1822-1836. 被引量:176
  • 5朱勤,骆轶姝,乐嘉锦.数据库加密与密文数据查询技术综述[J].东华大学学报(自然科学版),2007,33(4):543-548. 被引量:22
  • 6张敏,洪澄,陈驰.一种服务器透明的外包数据库查询验证方法[J].计算机研究与发展,2010,47(1):182-190. 被引量:17
  • 7DAMIANI E, De CAPITANI di VIMERCATI S, FORESTI S, et al. Selective data encryption in outsourced dynamic environments [ C ]// Proc of the 2nd International Workshop on Views on Designing Complex Architectures. 2007 : 127-142.
  • 8De CAPITANI di VIMERCATI S, FORESTI S, JAJODIA S. Over encryption : management of access control evolution on outsourced data [ C]//Proc of the 33rd International Conference on Very Large Data Bases. IS. 1. ] :ACM Press ,2007 :123-134.
  • 9BENNANI N, DAMIANI E, CIMATO S. Toward cloud-based key management for outsourced databases [ C ]//Proc of the 34th Annual IEEE Computer Software and Applications Conference. 2010: 232- 236.
  • 10ZHAO Wei, ZHAO Dan-feng, GAO Feng, et al. A cryptography index technology and method to measure information disclosure in the DAS model[ J]. WSEAS Trans on Information Science and Applications, 2009,9 ( 6 ) : 1443-1452.

二级参考文献109

  • 1王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 2马勺布,胡磊,徐德启.一种动态安全的密文数据库检索方法[J].计算机工程,2005,31(6):132-133. 被引量:19
  • 3朱勤,于守健,乐嘉锦.数据库水印研究与进展[J].计算机工程与应用,2006,42(29):198-201. 被引量:17
  • 4朱勤,于守健,乐嘉锦,骆轶姝.外包数据库系统安全机制研究[J].计算机科学,2007,34(2):152-156. 被引量:17
  • 5Cheng W, Pang H, Tan K. Authenticating multidimensional query results in data publishing [C] // LNCS4127: Proc of the 20th IFIP 11. 3 Working Conf on Data and Applications Security (DBSEC 2006). Berlin: Springer, 2006:60-73.
  • 6Devanbu P, Gertz M, Martel C, et al. Stubblebine. Authentic third-party data publication [OL]. p2009-06-05]. http://seelab, cs. ucdavis.edu/-devanbu/authdbpub, pdf.
  • 7Merkle R C. A certified digital signature [C] //LNCS435: Proc of the 9th Annual Int Cryptology Conf on Advances in Cryptology (CRYPTO 1989). Berlin: Springer, 1989: 218- 238.
  • 8Li F, Hadjieleftheriou M, et al. Dynamic authenticated index structures for outsourced databases [C]//Proc of the 2006 ACM SIGMOD Int Conf on Management of Data (SIGMOD 2006). New York: ACM, 2006:121-132.
  • 9Li F, Yi K, Hadjieleftheriou M, et al. Proof-infused streams: Enabling authentication of sliding windows queries on streams [C] //Proc of the 33rd Int Conf on Very Large Data Bases ( VLDB 2007 ): Vienna, Austria: VLDB Endowment, 2007: 147-158.
  • 10Yang Y, Papadopoulos S, Papadias D, et al. Spatial outsourcing for location-based services [C] //Proc of the 24th Int Conf on Data Engineering CA: IEEE Computer Society, (ICDE 2008). Los Alamitos, 2008: 1082-1091.

共引文献250

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部