Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen:
https://doi.org/10.21256/zhaw-3775
Publikationstyp: | Konferenz: Paper |
Art der Begutachtung: | Peer review (Publikation) |
Titel: | Stealth databases : ensuring user-controlled queries in untrusted cloud environments |
Autor/-in: | Spillner, Josef Beck, Martin Schill, Alexander Bohnert, Thomas Michael |
DOI: | 10.21256/zhaw-3775 |
Tagungsband: | 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015 |
Seite(n): | 261 |
Seiten bis: | 270 |
Angaben zur Konferenz: | 8th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015 |
Erscheinungsdatum: | 2015 |
Verlag / Hrsg. Institution: | IEEE |
ISBN: | 978-0-7695-5697-0 |
Sprache: | Englisch |
Schlagwörter: | Dispersion; Cloud computing; Stealth computing |
Fachgebiet (DDC): | 004: Informatik |
Zusammenfassung: | Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments. |
URI: | https://digitalcollection.zhaw.ch/handle/11475/7131 |
Volltext Version: | Akzeptierte Version |
Lizenz (gemäss Verlagsvertrag): | Lizenz gemäss Verlagsvertrag |
Departement: | School of Engineering |
Organisationseinheit: | Institut für Informatik (InIT) |
Enthalten in den Sammlungen: | Publikationen School of Engineering |
Dateien zu dieser Ressource:
Datei | Beschreibung | Größe | Format | |
---|---|---|---|---|
stealthdatabases-archive.pdf | 810.89 kB | Adobe PDF | Öffnen/Anzeigen |
Zur Langanzeige
Spillner, J., Beck, M., Schill, A., & Bohnert, T. M. (2015). Stealth databases : ensuring user-controlled queries in untrusted cloud environments [Conference paper]. 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–270. https://doi.org/10.21256/zhaw-3775
Spillner, J. et al. (2015) ‘Stealth databases : ensuring user-controlled queries in untrusted cloud environments’, in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. IEEE, pp. 261–270. Available at: https://doi.org/10.21256/zhaw-3775.
J. Spillner, M. Beck, A. Schill, and T. M. Bohnert, “Stealth databases : ensuring user-controlled queries in untrusted cloud environments,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 2015, pp. 261–270. doi: 10.21256/zhaw-3775.
SPILLNER, Josef, Martin BECK, Alexander SCHILL und Thomas Michael BOHNERT, 2015. Stealth databases : ensuring user-controlled queries in untrusted cloud environments. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. Conference paper. IEEE. 2015. S. 261–270. ISBN 978-0-7695-5697-0
Spillner, Josef, Martin Beck, Alexander Schill, and Thomas Michael Bohnert. 2015. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” Conference paper. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–70. IEEE. https://doi.org/10.21256/zhaw-3775.
Spillner, Josef, et al. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, IEEE, 2015, pp. 261–70, https://doi.org/10.21256/zhaw-3775.
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt, soweit nicht anderweitig angezeigt.