Nothing Special   »   [go: up one dir, main page]

skip to main content
column

A survey on querying encrypted XML documents for databases as a service

Published: 01 March 2008 Publication History

Abstract

"Database as a service" paradigm has gained a lot of interest in recent years. This has raised questions about the security of data in the servers. Firms outsourcing their XML databases to untrusted parties started to look for new ways to securely store data and efficiently query them. In this paper, encrypted XML documents, their crypto index structures and query processing using these structures are investigated. A comparison of various algorithms in the literature is given.

References

[1]
B. Hore, S. Mehrotra, G. Tsudik. Privacy Preserving Index for Range Queries. Proceedings of the 30th VLDB Conference, 2004. Toronto, Canada
[2]
Buneman, P., Choi, B., Fan, W., Hutchison, R., Mann, R., Viglas, S. Vectorizing and querying large XML repositories. 21st International Conference on Data Engineering. April 5, 8 261--272
[3]
Cheng, J., Ng, W.: XQzip: Querying compressed XML using structural indexing. 9th International Conference on Extending Database Technology March 14, 18. 2004. 219--236
[4]
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of the 2000 IEEE Symposium on Security and Privacy, p: 44--55, Oakland, CA, USA, May 2000.
[5]
E. Mykletun and G. Tsudik, On using Secure Hardware in Outsourced Databases. International Workshop on Innovative Architecture for Future Generation High Performance Processors and Systems January 2005
[6]
E. Damiani, S. Jajodia Balancing confidentiality and efficiency in Untrusted Relational DBMSs. CCS'03 October 27--30, 2003, Washington, USA.
[7]
Extensible Markup Language, XML 1.0 http://www.w3.org/TR/REC-xml, October 2000
[8]
G. I. Davida, D. L. Wells, and J. B. Kam. A database encryption system with subkeys. ACM Transactions on Database Systems, 6(2)p:312--328, June 1981.
[9]
G. Ozsoyoglu, D. Singer, S. Chung. Anti-tamper databases: Querying Encrypted Databases In Proc. of the 17th Annual IFIP WG 11.3 Working Conferece on Database Applications and Security, August 2003.
[10]
H. Hacigumus, S. Mehrotra, and B. Iyer. Providing Database as a Service. Proceedings of the 18th International Conference on Data Engineering, 26 February - 1 March 2002, p: 29--40, 2002.
[11]
H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotr. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA June 2002.
[12]
H. Wang, L. Lakshmanan. Efficient Secure Query Evaluation over Encrypted XML Databases. 32nd International Conference on Very Large Data Bases, 2006 September 12--15.
[13]
J. Lee, K. Whang. Secure query processing against encrypted XML data using Query-Aware Decryption. Elsevier, Information Sciences. 2006 p:1928--1947
[14]
L. Feng and W. Jonker. Efficient Processing of Secured XML Metadata. OTM Workshops 2003 p: 704--717
[15]
M. Schrefl, K. Grun, J. Dorn. SemCrypt - Ensuring Privacy of Electronic Documents through Semantic-Based Encrypted Query Processing. 21st International Conference on Data Engineering Workshops. April 5, 8 p: 1191
[16]
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu Order preserving encryption. SIGMOD 2004 June 13--18, Paris, France
[17]
R. C. Jammalamadaka, S. Mehrotra. Querying Encrypted XML documents. IDEAS'06
[18]
Sun. S. Chung, G. Ozsoygolu. Anti-tamper databases: Processing Aggregate Queries over Encrypted Databases In Proc. of the 22nd International Conference on Data Engineering Workshops, ICDEW '06.
[19]
T. Imamura, B. Dillaway, E. Simon, XML Encryption Syntax and Processing, W3C Recommendation, December 2002. http://www.w3.org/TR/xmlenc-core/ March 2002.
[20]
XML Encryption Requirements, http://www.w3.org/TR/xml-encryption-req, March 2002.
[21]
Y. Yang, W. Ng, H. L. Lau, and J. Cheng. An Efficient Approach to Support Querying Secure Outsourced XML Information CAiSE 2006, LNCS 4001, p:157--171, 2006.

Cited By

View all
  • (2020)CryptDICE: Distributed data protection system for secure cloud data storage and computationInformation Systems10.1016/j.is.2020.101671(101671)Online publication date: Oct-2020
  • (2017)Assignment as a location-based service in outsourced databasesTURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES10.3906/elk-1511-19025(1612-1628)Online publication date: 2017
  • (2016)Integrity Verification For Outsourced XML Database In Cloud StorageProceedings of the International Conference on Informatics and Analytics10.1145/2980258.2980354(1-5)Online publication date: 25-Aug-2016
  • Show More Cited By

Index Terms

  1. A survey on querying encrypted XML documents for databases as a service

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGMOD Record
    ACM SIGMOD Record  Volume 37, Issue 1
    March 2008
    61 pages
    ISSN:0163-5808
    DOI:10.1145/1374780
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 March 2008
    Published in SIGMOD Volume 37, Issue 1

    Check for updates

    Author Tags

    1. XML
    2. database as a service
    3. encryption
    4. querying encrypted XML document algorithms

    Qualifiers

    • Column

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)CryptDICE: Distributed data protection system for secure cloud data storage and computationInformation Systems10.1016/j.is.2020.101671(101671)Online publication date: Oct-2020
    • (2017)Assignment as a location-based service in outsourced databasesTURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES10.3906/elk-1511-19025(1612-1628)Online publication date: 2017
    • (2016)Integrity Verification For Outsourced XML Database In Cloud StorageProceedings of the International Conference on Informatics and Analytics10.1145/2980258.2980354(1-5)Online publication date: 25-Aug-2016
    • (2015)Efficient XQuery over encrypted XML documents2015 10th International Conference on Computer Science & Education (ICCSE)10.1109/ICCSE.2015.7250235(159-162)Online publication date: Jul-2015
    • (2013)Efficient Tree Pattern Queries On Encrypted XML DocumentsTransactions on Data Privacy10.5555/2612272.26122746:3(199-226)Online publication date: 1-Dec-2013
    • (2013)Efficient tree pattern queries on encrypted XML documentsProceedings of the Joint EDBT/ICDT 2013 Workshops10.1145/2457317.2457338(111-120)Online publication date: 18-Mar-2013
    • (2013)A survey on XML security2013 International Conference on Recent Trends in Information Technology (ICRTIT)10.1109/ICRTIT.2013.6844275(638-642)Online publication date: Jul-2013
    • (2012)Database Size Estimation by Query Performance -- A Complexity AspectProceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing10.1109/UCC.2012.9(47-54)Online publication date: 5-Nov-2012
    • (2012)Number List-based Interval Labeling Scheme for Structural Index Building of Encrypted XML DataProceedings of the 2012 International Conference on Industrial Control and Electronics Engineering10.1109/ICICEE.2012.100(353-357)Online publication date: 23-Aug-2012
    • (2012)Positive and negative association rule mining on XML data streams in database as a service conceptExpert Systems with Applications: An International Journal10.1016/j.eswa.2012.01.12839:8(7503-7511)Online publication date: 1-Jun-2012
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media