Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-3775
Publication type: Conference paper
Type of review: Peer review (publication)
Title: Stealth databases : ensuring user-controlled queries in untrusted cloud environments
Authors: Spillner, Josef
Beck, Martin
Schill, Alexander
Bohnert, Thomas Michael
DOI: 10.21256/zhaw-3775
Proceedings: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015
Page(s): 261
Pages to: 270
Conference details: 8th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015
Issue Date: 2015
Publisher / Ed. Institution: IEEE
ISBN: 978-0-7695-5697-0
Language: English
Subjects: Dispersion; Cloud computing; Stealth computing
Subject (DDC): 004: Computer science
Abstract: Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments.
URI: https://digitalcollection.zhaw.ch/handle/11475/7131
Fulltext version: Accepted version
License (according to publishing contract): Licence according to publishing contract
Departement: School of Engineering
Organisational Unit: Institute of Computer Science (InIT)
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
stealthdatabases-archive.pdf810.89 kBAdobe PDFThumbnail
View/Open
Show full item record
Spillner, J., Beck, M., Schill, A., & Bohnert, T. M. (2015). Stealth databases : ensuring user-controlled queries in untrusted cloud environments [Conference paper]. 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–270. https://doi.org/10.21256/zhaw-3775
Spillner, J. et al. (2015) ‘Stealth databases : ensuring user-controlled queries in untrusted cloud environments’, in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. IEEE, pp. 261–270. Available at: https://doi.org/10.21256/zhaw-3775.
J. Spillner, M. Beck, A. Schill, and T. M. Bohnert, “Stealth databases : ensuring user-controlled queries in untrusted cloud environments,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 2015, pp. 261–270. doi: 10.21256/zhaw-3775.
SPILLNER, Josef, Martin BECK, Alexander SCHILL und Thomas Michael BOHNERT, 2015. Stealth databases : ensuring user-controlled queries in untrusted cloud environments. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. Conference paper. IEEE. 2015. S. 261–270. ISBN 978-0-7695-5697-0
Spillner, Josef, Martin Beck, Alexander Schill, and Thomas Michael Bohnert. 2015. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” Conference paper. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–70. IEEE. https://doi.org/10.21256/zhaw-3775.
Spillner, Josef, et al. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, IEEE, 2015, pp. 261–70, https://doi.org/10.21256/zhaw-3775.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.