Security issues due to outsourcing sensitive data to the untrusted remote server
General Material Designation
[Thesis]
General Material Designation
[Thesis]
General Material Designation
[Thesis]
General Material Designation
[Thesis]
First Statement of Responsibility
Mohammad Saiful Islam
Subsequent Statement of Responsibility
Kantarcioglu, Murat
.PUBLICATION, DISTRIBUTION, ETC
Name of Publisher, Distributor, etc.
The University of Texas at Dallas
Date of Publication, Distribution, etc.
2014
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
101
GENERAL NOTES
Text of Note
Committee members: Khan, Latifur; Schweitzer, Haim; Thuraisingham, Bhavani
NOTES PERTAINING TO PUBLICATION, DISTRIBUTION, ETC.
Text of Note
Place of publication: United States, Ann Arbor; ISBN=978-1-321-05679-2
DISSERTATION (THESIS) NOTE
Dissertation or thesis details and type of degree
Ph.D.
Discipline of degree
Computer Science
Body granting the degree
The University of Texas at Dallas
Text preceding or following the note
2014
SUMMARY OR ABSTRACT
Text of Note
With the advent of cloud computing, outsourcing data to cloud providers is becoming more popular due to the lower cost and increased flexibility. At the same time, concerns related to security of the outsourced data are increasing. To address these concerns, various protocols have been proposed in the literature to outsource data in an encrypted format and execute queries over encrypted data. Oblivious RAM protocols allow access to remote encrypted data without revealing access pattern even to the remote server. Unfortunately, even the most efficient Oblivious RAM protocol is too expensive to be used in most practical applications. Alternatively, a lot of efficient protocols have been proposed in the literature that allow query execution over encrypted data. There are practical Searchable Symmetric Encryption (SSE) techniques that allow keyword search over remote encrypted data. Database-As-a-Service (DAS), on the other hand, allows SQL queries to be executed over remote encrypted data. All these efficient techniques purposefully reveal data access pattern to an adversary for the sake of efficiency.
TOPICAL NAME USED AS SUBJECT
Computer science
UNCONTROLLED SUBJECT TERMS
Subject Term
Applied sciences;Access pattern disclosure;Database as a service;Inference attacks;Searchable encryptions;Searchable symmetric encryptions