11 research outputs found

    Supporting security and consistency for cloud database

    No full text
    Typical Cloud database services guarantee high availability and scalability, but they rise many concerns about data confidentiality. Combining encryption with SQL operations is a promising approach although it is characterized by many open issues. Existing proposals, which are based on some trusted intermediate server, limit availability and scalability of original cloud database services. We propose an alternative architecture that avoids any intermediary component, thus achieving availability and scalability comparable to that of unencrypted cloud database services. Moreover, our proposal guarantees data consistency in scenarios in which independent clients concurrently execute SQL queries, and the structure of the database can be modified

    Data security and privacy in the Cloud

    No full text
    Achieving data security and privacy in the cloud means ensuring con\ufb01dentiality and integrity of data and computations, and protection from non authorized accesses. Satisfaction of such requirements entails non trivial challenges, as relying on external servers, owners lose control on their data. In this paper, we discuss the problems of guaranteeing proper data security and privacy in the cloud, and illustrate possible solutions for them

    MetaP: Revisiting Privacy-Preserving Data Publishing using Secure Devices

    No full text
    International audienceThe goal of Privacy-Preserving Data Publishing (PPDP) is to gen- erate a sanitized (i.e. harmless) view of sensitive personal data (e.g. a health survey), to be released to some agencies or simply the public. However, traditional PPDP practices all make the assumption that the process is run on a trusted central server. In this article, we argue that the trust assumption on the central server is far too strong. We propose MetAP, a generic fully distributed protocol, to execute various forms of PPDP algorithms on an asymmetric architecture composed of low power secure devices and a powerful but untrusted infrastructure. We show that this protocol is both correct and secure against honest-but-curious or malicious adversaries. Finally, we provide an experimental validation showing that this protocol can support PPDP processes scaling up to nation-wide survey
    corecore