Abstract
Cloud-based data management poses several challenges which go beyond traditional database technologies. Outsourcing the operation of database applications to a provider who, on the one hand, takes responsibility not only for providing the infrastructure but also for maintaining the system and, on the other hand, can pool resources and operate them in a cost-efficient and dynamic way promise cost savings and elasticity in usage. However, most customers are willing to move their on-premise setup to a hosted environment only if their data are kept securely and privately as well as non-functional properties such as availability or performance are guaranteed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
We omit the randomization parameter for clarity, but identity-based encryption is also randomized.
References
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Journal of Cryptology 21(3), 350–391 (2008)
Ada Popa, R., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: SOSP (2011)
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009). URL http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: CRYPTO (2007)
Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: EUROCRYPT (2009)
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM Journal of Computing 32(3), 586–615 (2003)
Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. In: TCC (2005)
Cassier, P., Defendi, A., Fischer, D., Hutchinson, J., Maneville, A., Membrini, G., Ong, C., Rowley, A.: System Programmer’s Guide to Workload Manager. No. SG24-6472-03 in Redbooks. IBM (2008)
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Public Key Cryptography (2001)
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal of Computing 30(2), 391–437 (2000)
Ganapathi, A., Kuno, H.A., Dayal, U., Wiener, J.L., Fox, A., Jordan, M.I., Patterson, D.A.: Predicting multiple metrics for queries: Better decisions enabled by machine learning. In: ICDE, pp. 592–603 (2009)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC (2009)
Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. Cryptology ePrint Archive, Report 2010/520 (2010)
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Sciences 28(2), 270–299 (1984)
Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: SIGMOD (2002)
Kephart, J.O., Das, R.: Achieving self-management via utility functions. IEEE Internet Computing 11(1), 40–48 (2007)
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS (1997)
Lee, L.T., Lee, S.T., Chang, J.C.: An extenics-based dynamic resource adjustment for the virtual machine in cloud computing environment. In: , 2011 4th International Conference on Ubi-Media Computing (U-Media), pp. 65–70 (2011)
Ostrovsky, R., III, W.E.S.: A survey of single-database private information retrieval: Techniques and applications. In: Public Key Cryptography (2007)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT (1999)
Ramamritham, K.: Real-time databases. Distributed and Parallel Databases 1(2), 199–226 (1993)
Shi, E., Bethencourt, J., Chan, H.T.H., Song, D.X., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy (2007)
Soror, A.A., Minhas, U.F., Aboulnaga, A., Salem, K., Kokosielis, P., Kamath, S.: Automatic Virtual Machine Configuration for Database Workloads. ACM Transactions on Database Systems 35(1), 1–47 (2010)
Xiong, P., Chi, Y., Zhu, S., Moon, H.J., Pu, C., Hacigümüs, H.: Intelligent management of virtualized resources for database systems in cloud environment. In: ICDE, pp. 87–98 (2011)
Yang, C.T., Wang, K.C., Cheng, H.Y., Kuo, C.T., Chu, W.: Green power management with dynamic resource allocation for cloud virtual machines. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 726 –733 (2011)
Zhang, Q., Zhu, Q., Boutaba, R.: Dynamic resource allocation for spot markets in cloud computing environments. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 178–185 (2011)
Zhu, Q., Agrawal, G.: Resource provisioning with budget constraints for adaptive applications in cloud environments. In: Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, pp. 304–307 (2010)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Lehner, W., Sattler, KU. (2013). Cloud-Specific Services for Data Management. In: Web-Scale Data Management for the Cloud. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6856-1_5
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6856-1_5
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6855-4
Online ISBN: 978-1-4614-6856-1
eBook Packages: Computer ScienceComputer Science (R0)