RASP: efficient multidimensional range query on attack-resilient encrypted databases

@inproceedings{Chen2011RASPEM,
  title={RASP: efficient multidimensional range query on attack-resilient encrypted databases},
  author={Keke Chen and Ramakanth Kavuluru and Shumin Guo},
  booktitle={CODASPY},
  year={2011}
}
Range query is one of the most frequently used queries for online data analytics. Providing such a query service could be expensive for the data owner. With the development of services computing and cloud computing, it has become possible to outsource large databases to database service providers and let the providers maintain the range-query service. With outsourced services, the data owner can greatly reduce the cost in maintaining computing infrastructure and data-rich applications. However… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 40 CITATIONS

Secure and Efficient Query Retrieval in Cloud Storage using Erasure Code System

Viswanathan Sathiyapriya, S. Vidhushavarshini, M. Marimuthu, T. Goudhami
  • 2015
VIEW 8 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

On Security of RASP Data Perturbation for Secure Half-Space Queries in the Cloud

  • 2012
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Privacy preserving boosting in the cloud with secure half-space queries

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND

Compromising privacy in precise query protocols

VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

PerturBoost: Practical Confidential Classifier Learning in the Cloud

  • 2013 IEEE 13th International Conference on Data Mining
  • 2013
VIEW 4 EXCERPTS
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-4 OF 4 REFERENCES

Replication is not needed: single database, computationally-private information retrieval

  • Proceedings 38th Annual Symposium on Foundations of Computer Science
  • 1997
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Private information retrieval

  • Proceedings of IEEE 36th Annual Foundations of Computer Science
  • 1995
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL