Abstract. We describe an architecture for a database service that does not assume that the service provider can be trusted. Unlike other ar-chitectures that address this problem, this architecture, which we call blind custodians, does not rely on encryption. Instead, it offers confi-dentiality by means of information dissociation: The server only stores “fragments ” of information that are considered safe (i.e., each fragment does not violate privacy), while the client stores the associations be-tween the fragments that are necessary to reconstruct the information. We argue that this architecture allows satisfactory confidentiality, while offering two important advantages: (1) It does not restrict the types of queries that can be submitted ...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
The scope and character of today's computing environments are progressively shifting from traditiona...
This paper analyzes the most relevant privacy and security breaches that may arise in the Database a...
We describe an architecture for a database service that does not assume that the service provider ca...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Several architectures have been recently proposed that store relational data in encrypted form on un...
Abstract—The Blind Seer system (Oakland 2014) is an efficient and scalable DBMS that affords both cl...
While online service providers are sometimes accused of forwarding identifying customer information ...
Nowadays the whole world is immersed in data. Starting from creating the data, using the data, shari...
In this paper, we explore a new paradigm for data management in which a third party service provider...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...
Abstract: As databases become networked in more complex multi-tiered applications, their vulnerabili...
While online service providers are sometimes accused of forwarding identifying customer information ...
Verifiable databases (VDB) enables the data owner to outsource a huge unencrypted database to the po...
Various methods are present for storage services, whereas solutions of data privacy for database ser...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
The scope and character of today's computing environments are progressively shifting from traditiona...
This paper analyzes the most relevant privacy and security breaches that may arise in the Database a...
We describe an architecture for a database service that does not assume that the service provider ca...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
Several architectures have been recently proposed that store relational data in encrypted form on un...
Abstract—The Blind Seer system (Oakland 2014) is an efficient and scalable DBMS that affords both cl...
While online service providers are sometimes accused of forwarding identifying customer information ...
Nowadays the whole world is immersed in data. Starting from creating the data, using the data, shari...
In this paper, we explore a new paradigm for data management in which a third party service provider...
Database outsourcing, whilst becoming more popular in recent years, is creating substantial security...
Abstract: As databases become networked in more complex multi-tiered applications, their vulnerabili...
While online service providers are sometimes accused of forwarding identifying customer information ...
Verifiable databases (VDB) enables the data owner to outsource a huge unencrypted database to the po...
Various methods are present for storage services, whereas solutions of data privacy for database ser...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
The scope and character of today's computing environments are progressively shifting from traditiona...
This paper analyzes the most relevant privacy and security breaches that may arise in the Database a...