Encyclopedia of Database Systems

2009 Edition
| Editors: LING LIU, M. TAMER ÖZSU

Secure Data Outsourcing

  • Barbara Carminati
Reference work entry
DOI: https://doi.org/10.1007/978-0-387-39940-9_328

Synonyms

Definition

Data outsourcing is a new, emerging data management paradigm in which the owner of data is no longer totally responsible for its management. Rather, a portion of data is outsourced to external providers who offer data management functionalities. Secure data outsourcing is a discipline that investigates security issues associated with data outsourcing.

Historical Background

At present, service outsourcing is a paradigm widely used by many companies and organizations to achieve better service by delegating some of their business functions to external specialized service providers. A natural evolution of this paradigm is the recent emergence of data outsourcing. With this strategy, a company is no longer completely responsible for its own data management. Rather, it outsources some of its data functionalities to one or more external data management service providers (such as efficient query processing or large storage capability)....

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Bertino E., Carminati B., Ferrari E., Thuraisingham B., and Gupta A. Selective and authentic third-party distribution of XML documents. IEEE Trans. Knowl. Data Eng., 16(10):1263–1278, 2004.Google Scholar
  2. 2.
    Boneh D., Gentry C., Lynn B., and Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In Proc. Advances in Cryptology, 2003.(Eli Biham ed.).Google Scholar
  3. 3.
    Carminati B., Ferrari E., and Bertino E. Securing XML data in third-party distribution systems. In Proc. Int. Conf. on Information and Know, ledge Management2005.Google Scholar
  4. 4.
    Chang Y. and Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report, 2004.Google Scholar
  5. 5.
    Chor B., Goldreich O., Kushilevitz E., and Sudan M. Private information retrieval. In Proc. Symp. on Foundations of Computer Science, 1995.Google Scholar
  6. 6.
    Devanbu P., Gertz M., Kwong A., Martel C., Nuckolls G., and Stubblebine S.G. Flexible authentication of XML documents. In Proc. 8th ACM Conf. on Computer and Communications Security, 2001.Google Scholar
  7. 7.
    Devanbu P., Gertz M., Martel C., and Stubblebine S.G. Authentic third-party data publication. In Proc. 14th Annual IFIP WG 11.3 Working conference on Database Security, 2000.Google Scholar
  8. 8.
    Goh E. Secure Indexes, Cryptology ePrint Archive, Report 2003/216, 2003.Google Scholar
  9. 9.
    Golle P., Staddon J., and Waters B. Secure conjunctive keyword search over encrypted data. In Proc. the Applied Cryptography and Network Security Conf., 2004.Google Scholar
  10. 10.
    Hacigumus H., Iyer B., Li C., and Mehrotra S. Executing SQL over encrypted data in the database service provider model. In Proc. 9th Int. Conf. on Database Systems for Advanced Applications, 2002.Google Scholar
  11. 11.
    Hacigumus H., Iyer B., Li C., and Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases. In Proc. 9th Int. Conf. on Database Systems for Advanced Applications, 2004.Google Scholar
  12. 12.
    Mykletun E., Narasimha M., and Tsudik G. Authentication and integrity in outsourced databases. In Proc. 11th Annual Symp. on Network and Distributed System Security, 2004.Google Scholar
  13. 13.
    Pang H., Jain A., Ramamritham K., and Tan K. Verifying completeness of relational query results in data publishing. In Proc. ACM SIGMOD Int. Conf. on Management of Data, 2005.Google Scholar
  14. 14.
    Pang H. and Tan K. Authenticating query results in edge computing. In Proc. 20th Int. Conf. on Data Engineering, 2004.Google Scholar
  15. 15.
    Rivest R., Adleman L., and Dertouzos M. On data banks and privacy homomorphisms. In Foundations of Secure Computation, Richard J. Lipton, David P. Dobkin, Anita K. Jones (eds.). Academic press, 1978, pp 169–178.Google Scholar
  16. 16.
    Song D.X., Wagner D., and Perrig A. Practical techniques for searches on encrypted data. In Proc. IEEE Symp. on Security and Privacy, 2000.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Barbara Carminati
    • 1
  1. 1.University of InsubriaVareseItaly