Skip to main content

Cloud-Specific Services for Data Management

  • Chapter
  • First Online:
Book cover Web-Scale Data Management for the Cloud

Abstract

Cloud-based data management poses several challenges which go beyond traditional database technologies. Outsourcing the operation of database applications to a provider who, on the one hand, takes responsibility not only for providing the infrastructure but also for maintaining the system and, on the other hand, can pool resources and operate them in a cost-efficient and dynamic way promise cost savings and elasticity in usage. However, most customers are willing to move their on-premise setup to a hosted environment only if their data are kept securely and privately as well as non-functional properties such as availability or performance are guaranteed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://xeround.com.

  2. 2.

    http://www.scalebase.com.

  3. 3.

    http://calculator.s3.amazonaws.com/calc5.html.

  4. 4.

    http://www.windowsazure.com/en-us/pricing/calculator/.

  5. 5.

    We omit the randomization parameter for clarity, but identity-based encryption is also randomized.

References

  1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Journal of Cryptology 21(3), 350–391 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  2. Ada Popa, R., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: SOSP (2011)

    Google Scholar 

  3. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009). URL http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html

  4. Bellare, M., Boldyreva, A., O’Neill, A.: Deterministic and efficiently searchable encryption. In: CRYPTO (2007)

    Google Scholar 

  5. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: EUROCRYPT (2009)

    Google Scholar 

  6. Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM Journal of Computing 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  7. Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-dnf formulas on ciphertexts. In: TCC (2005)

    Google Scholar 

  8. Cassier, P., Defendi, A., Fischer, D., Hutchinson, J., Maneville, A., Membrini, G., Ong, C., Rowley, A.: System Programmer’s Guide to Workload Manager. No. SG24-6472-03 in Redbooks. IBM (2008)

    Google Scholar 

  9. Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Public Key Cryptography (2001)

    Google Scholar 

  10. Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal of Computing 30(2), 391–437 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  11. Ganapathi, A., Kuno, H.A., Dayal, U., Wiener, J.L., Fox, A., Jordan, M.I., Patterson, D.A.: Predicting multiple metrics for queries: Better decisions enabled by machine learning. In: ICDE, pp. 592–603 (2009)

    Google Scholar 

  12. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC (2009)

    Google Scholar 

  13. Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. Cryptology ePrint Archive, Report 2010/520 (2010)

    Google Scholar 

  14. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and Systems Sciences 28(2), 270–299 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hacigümüs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: SIGMOD (2002)

    Google Scholar 

  16. Kephart, J.O., Das, R.: Achieving self-management via utility functions. IEEE Internet Computing 11(1), 40–48 (2007)

    Article  Google Scholar 

  17. Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS (1997)

    Google Scholar 

  18. Lee, L.T., Lee, S.T., Chang, J.C.: An extenics-based dynamic resource adjustment for the virtual machine in cloud computing environment. In: , 2011 4th International Conference on Ubi-Media Computing (U-Media), pp. 65–70 (2011)

    Google Scholar 

  19. Ostrovsky, R., III, W.E.S.: A survey of single-database private information retrieval: Techniques and applications. In: Public Key Cryptography (2007)

    Google Scholar 

  20. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT (1999)

    Google Scholar 

  21. Ramamritham, K.: Real-time databases. Distributed and Parallel Databases 1(2), 199–226 (1993)

    Article  Google Scholar 

  22. Shi, E., Bethencourt, J., Chan, H.T.H., Song, D.X., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy (2007)

    Google Scholar 

  23. Soror, A.A., Minhas, U.F., Aboulnaga, A., Salem, K., Kokosielis, P., Kamath, S.: Automatic Virtual Machine Configuration for Database Workloads. ACM Transactions on Database Systems 35(1), 1–47 (2010)

    Article  Google Scholar 

  24. Xiong, P., Chi, Y., Zhu, S., Moon, H.J., Pu, C., Hacigümüs, H.: Intelligent management of virtualized resources for database systems in cloud environment. In: ICDE, pp. 87–98 (2011)

    Google Scholar 

  25. Yang, C.T., Wang, K.C., Cheng, H.Y., Kuo, C.T., Chu, W.: Green power management with dynamic resource allocation for cloud virtual machines. In: 2011 IEEE 13th International Conference on High Performance Computing and Communications (HPCC), pp. 726 –733 (2011)

    Google Scholar 

  26. Zhang, Q., Zhu, Q., Boutaba, R.: Dynamic resource allocation for spot markets in cloud computing environments. In: 2011 Fourth IEEE International Conference on Utility and Cloud Computing (UCC), pp. 178–185 (2011)

    Google Scholar 

  27. Zhu, Q., Agrawal, G.: Resource provisioning with budget constraints for adaptive applications in cloud environments. In: Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, pp. 304–307 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lehner, W., Sattler, KU. (2013). Cloud-Specific Services for Data Management. In: Web-Scale Data Management for the Cloud. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6856-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6856-1_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6855-4

  • Online ISBN: 978-1-4614-6856-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics