Please use this identifier to cite or link to this item:
https://doi.org/10.21256/zhaw-3775
Publication type: | Conference paper |
Type of review: | Peer review (publication) |
Title: | Stealth databases : ensuring user-controlled queries in untrusted cloud environments |
Authors: | Spillner, Josef Beck, Martin Schill, Alexander Bohnert, Thomas Michael |
DOI: | 10.21256/zhaw-3775 |
Proceedings: | 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015 |
Page(s): | 261 |
Pages to: | 270 |
Conference details: | 8th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015 |
Issue Date: | 2015 |
Publisher / Ed. Institution: | IEEE |
ISBN: | 978-0-7695-5697-0 |
Language: | English |
Subjects: | Dispersion; Cloud computing; Stealth computing |
Subject (DDC): | 004: Computer science |
Abstract: | Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments. |
URI: | https://digitalcollection.zhaw.ch/handle/11475/7131 |
Fulltext version: | Accepted version |
License (according to publishing contract): | Licence according to publishing contract |
Departement: | School of Engineering |
Organisational Unit: | Institute of Computer Science (InIT) |
Appears in collections: | Publikationen School of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
stealthdatabases-archive.pdf | 810.89 kB | Adobe PDF | View/Open |
Show full item record
Spillner, J., Beck, M., Schill, A., & Bohnert, T. M. (2015). Stealth databases : ensuring user-controlled queries in untrusted cloud environments [Conference paper]. 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–270. https://doi.org/10.21256/zhaw-3775
Spillner, J. et al. (2015) ‘Stealth databases : ensuring user-controlled queries in untrusted cloud environments’, in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. IEEE, pp. 261–270. Available at: https://doi.org/10.21256/zhaw-3775.
J. Spillner, M. Beck, A. Schill, and T. M. Bohnert, “Stealth databases : ensuring user-controlled queries in untrusted cloud environments,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 2015, pp. 261–270. doi: 10.21256/zhaw-3775.
SPILLNER, Josef, Martin BECK, Alexander SCHILL und Thomas Michael BOHNERT, 2015. Stealth databases : ensuring user-controlled queries in untrusted cloud environments. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. Conference paper. IEEE. 2015. S. 261–270. ISBN 978-0-7695-5697-0
Spillner, Josef, Martin Beck, Alexander Schill, and Thomas Michael Bohnert. 2015. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” Conference paper. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–70. IEEE. https://doi.org/10.21256/zhaw-3775.
Spillner, Josef, et al. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, IEEE, 2015, pp. 261–70, https://doi.org/10.21256/zhaw-3775.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.