2013
DOI: 10.1109/tcc.2013.18
|View full text |Cite
|
Sign up to set email alerts
|

Integrity for join queries in the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
37
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 30 publications
(38 citation statements)
references
References 22 publications
1
37
0
Order By: Relevance
“…These techniques provide deterministic integrity guarantees but only for queries with conditions on the attribute(s) on which the data structure has been built. Probabilistic approaches complement the data with fictitious information or checks whose absence in a query result signals an integrity violation (e.g., [21,47,50]). Probabilistic approaches can detect an integrity violation for any query but with only probabilistic guarantees.…”
Section: Integrity Of Computationsmentioning
confidence: 99%
“…These techniques provide deterministic integrity guarantees but only for queries with conditions on the attribute(s) on which the data structure has been built. Probabilistic approaches complement the data with fictitious information or checks whose absence in a query result signals an integrity violation (e.g., [21,47,50]). Probabilistic approaches can detect an integrity violation for any query but with only probabilistic guarantees.…”
Section: Integrity Of Computationsmentioning
confidence: 99%
“…Current approaches for integrity verification consider only equi-joins that are executed as semi-joins (or regular joins) by a computational server and are based on the combined adoption of encryption on the fly (to protect data confidentiality), and of markers and twins (to provide integrity guarantees) [2,3].…”
Section: Basic Concepts and Problem Statementmentioning
confidence: 99%
“…In this context, users and organizations can therefore decide to store their data at reliable and well-known storage servers and perform computationally intensive processes (e.g., join operations) using the computational services offered by a less expensive and potentially untrusted computational server. Besides performance considerations, an important advantage of relying on storage and computational servers is due to the economic advantage of such a choice [3]. While appealing, this approach brings inherent risks related to the confidentiality and integrity of data and computations, which are difficult to mitigate since data are not under the direct control of their owners.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations