Đang chuẩn bị liên kết để tải về tài liệu:
Executing SQL over Encrypted Data in the Database-Service-Provider Model

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The scripts provided as part of this paper are sample code which can be used to base your own scripts on. These scripts have been tested on an Oracle Enterprise Linux - 2 node cluster. It is expected that they should work on all Oracle Clusterware supported platforms. Oracle Support cannot provide any direct support for these scripts. You should thoroughly test the scripts – in particular the check action of each script to ensure compatibility with your operating system. The check action implemented in the sample scripts for the listener and the database simply ensure that a process is. | Executing SQL over Encrypted Data in the Database-Service-Provider Model Hakan Hacigủmủẹ5 1 Bala Iyer2 Chen Li1 Sharad Mehrotra1 Department of Information and Computer Science University of California Irvine CA 92697 USA hakanh@acm.org chenli sharad @ics.uci.edu 2IBM Silicon Valley Lab. San Jose CA 95141 USA balaiyer@us.ibm.com ABSTRACT Rapid advances in networking and Internet technologies have fueled the emergence of the software as a service model for enterprise computing. Successful examples of commercially viable software services include rent-a-spreadsheet electronic mail services general storage services disaster protection services. Database as a Service model provides users power to create store modify and retrieve data from anywhere in the world as long as.they have access to the Internet. It introduces several challenges an important issue being data privacy. It is in this context that we specifically address the issue of data privacy. . There are two main privacy issues. First the owner of the data needs to be assured that the data stored on the service-provider site is protected against data thefts from outsiders. Second data needs to be protected even from the service providers if the providers themselves cannot be trusted. In this paper we focus on the second challenge. Specifically we explore techniques to execute SQL queries over encrypted data. Our strategy is to process as much of the query as possible at the service providers site without having to decrypt the data. Decryption and the remainder of the query processing are performed at the client site. The paper explores an algebraic framework to split the query to minimize the computation at the client site. Results of experiments validating our approach are also presented. 1. INTRODUCTION The Internet has made it possible for all computers to be connected to one another. The influence of transactionprocessing systems and the Internet ushered in the era of e-business. The Internet has also had a

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.