Privacy of outsourced data

4Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Data outsourced to an external storage server are usually encrypted since there is the common assumption that all data are equally sensitive. The encrypted data however cannot be efficiently queried and their selective release is not possible or require the application of specific solutions. To overcome these problems, new proposals have been recently developed, which are based on a fragmentation technique possibly combined with encryption. The main advantage of these proposals is that they limit the use of encryption, thus improving query execution efficiency. In this paper, we describe such fragmentation-based approaches focusing in particular on the different data fragmentation models proposed in the literature. We then conclude the paper with a discussion on some research directions.

Cite

CITATION STYLE

APA

De Capitani di Vimercati, S., & Foresti, S. (2010). Privacy of outsourced data. In IFIP Advances in Information and Communication Technology (Vol. 320, pp. 174–187). Springer New York LLC. https://doi.org/10.1201/9781420052183.ch19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free