Skip to main content

Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures

  • Chapter
  • 599 Accesses

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal R, Kiernan J, Srikant R, Xu Y (2002) Hippocratic Databases, In: Proc. 28th International Conference on Very Large Databases (VLDB’02), Hong Kong, China, 143–157

    Google Scholar 

  2. Akl SG, Taylor PD (1983) Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transaction in Computer Systems, 1(3):239–248

    Article  Google Scholar 

  3. Bertino E, Carminati B, Ferrari E (2002) A Temporal Key Management Scheme for Broadcasting XML Documents. In: Proc. 9th ACM Conference on Computer and Communications Security (CCS’02), Washington, VA, 31–40

    Google Scholar 

  4. Bertino E, Ferrari E (2002) Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security, 5(3):290–331

    Article  Google Scholar 

  5. Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A (2004) Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10):1263–1278

    Article  Google Scholar 

  6. Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Advances in Cryptology - EUROCRPYT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, Lecture Notes in Computer Science, Springer, Berlin Heidelberg New York, 416–432

    Google Scholar 

  7. Carminati B, Ferrari E, Bertino E (2005) Securing XML Data in Third-Party Distribution Systems. In: Proc. ACM 14th Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 99–106

    Google Scholar 

  8. Carminati B, Ferrari E, Bertino E (2005) Assuring Security Properties in Third-party Architectures. In: Proc. 21st International Conference on Data Engineering (ICDE’05), Tokyo, Japan, 574–548

    Google Scholar 

  9. Carminati B, Ferrari E (2006) Confidentiality Enforcement for XML Outsourced Data. In: Proc. 2nd EDBT Workshop on Database Technologies for Handling XML Information on the Web (DATAX’06), Munich, Germany

    Google Scholar 

  10. Charanjit S, Yung M (1996) Paytree: Amortized Signature for Flexible Micropayments. In: Proc. 2nd Usenix Workshop on Electronic Commerce, Oakland, CA, 213–221

    Google Scholar 

  11. Cockcroft S, Clutterbuck P (2001) Attitudes Towards Information Privacy. In: Proc. 12th Australasian Conference on Information Systems, Coffs Harbour, NSW, Australia

    Google Scholar 

  12. Chor B, Goldreich O, Kushilevitz E, Sudan M (1999) Private Information Retrieval. Journal of the ACM, 45(6):965–982

    Article  Google Scholar 

  13. Devanbu P, Gertz M, Martel C, Stubblebine SG (2000) Authentic Third-party Data Publication. In: Proc. 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, the Netherlands, 101–112

    Google Scholar 

  14. Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG (2001) Flexible Authentication of XML Documents. In: Proc. 8th ACM Conference on Computer and Communications Security (CCS’01), Philadelphia, PA, 136–145

    Google Scholar 

  15. Hacigumus H, Iyer B, Li C, Mehrotra S (2002) Executing SQL over Encrypted Data in the Database Service Provider Model. In: Proc. ACM SIGMOD’2002, Madison, Wisconsin, 216–227

    Google Scholar 

  16. Hacigumus H, Iyer B, Mehrotra S (2002) Providing Database as a Service. In: Proc. 18th International Conference on Data Engineering (ICDE’02), San Jose, CA, 29

    Google Scholar 

  17. Hacigumus H, Iyer B, Li C, Mehrotra S (2004) Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Proc. 9th International Conference on Database Systems for Advanced Applications (DASFAA’04), Jeju Island, Korea, 125–136

    Google Scholar 

  18. Matheus A (2005) Declaration and Enforcement of Fine-grained Access Restrictions for a Service-based Geospatial Data Infrastructure. In: Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT’05), Stockholm, Sweden, 21–28

    Google Scholar 

  19. Mykletun E, Narasimha M, Tsudik G (2006) Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2(2):107–138

    Article  Google Scholar 

  20. Merkle RC (1989) A Certified Digital Signature. In: Proc. of Advances in Cryptology, Santa Barbara, CA, 218–238

    Google Scholar 

  21. Naor M, Nissim K (2000) Certificate Revocation and Certificate Update. IEEE Journal on Selected Areas in Communications, 18(4):561–570

    Article  Google Scholar 

  22. Narasimha M, Tsudik G (2005) DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining. In: Proc. ACM Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 235–236

    Google Scholar 

  23. OASIS Consortium, eXtensible Access Control Markup Language (XACML) (version 1.1), http://www.oasis-open.org/committees/xacml/

    Google Scholar 

  24. OGC Open Geospatial Consortium, Geography Markup Language (version 3.1.1), http://portal.opengeospatial.org/files/?artifact_id=4700

    Google Scholar 

  25. Rivest R, Adleman L, M Dertouzos (1978) On Data Banks and Privacy Homomorphisms. In: Foundations of Secure Computation, Academic Press Inc., 171–179

    Google Scholar 

  26. Song DX, Wagner D, Perrig A (2000) Practical Techniques for Searches on Encrypted Data. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, 44–55

    Google Scholar 

  27. Stallings W (2000) Network Security Essentials: Applications and Standards. Prentice Hall

    Google Scholar 

  28. World Wide Web Consortium, http://www.w3.org

    Google Scholar 

  29. Web Feature Service Interface Standard, http://www.opengeospatial.org/docs/02-058.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Carminati, B., Ferrari, E. (2007). Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures. In: Belussi, A., Catania, B., Clementini, E., Ferrari, E. (eds) Spatial Data on the Web. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69878-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69878-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69877-7

  • Online ISBN: 978-3-540-69878-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics