Acknowledgement
Supported by : 한국연구재단
References
- D. Sacharidis, K. Mouratidis and D. Papadias, "k-Anonymity in the Presence of External Databases," IEEE Transactions on Knowledge and Data Engineering, 2010.
- Y. Yang, D. Papadias, S. Papadopoulos and P. Kalnis, "Authentcated Join Processing in Outsourced Databases," ACM SIGMOD, 2009.
- M. L. Yiu, G. Ghinita, C. S. Jensen and P. Kalnis, "Outsourcing Search Services on Private Spatial Data," IEEE International Conference on Data Engineering, 2009.
- R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order Preserving Encryption for Numeric Data," Proc. of the ACM SIGMOD conf. on Management of Data, 2004.
- H. Lee, J. Chang, "A Group Order-Preserving Encryption Scheme based on Periodic Functions for Efficient Query Processing on Encrypted Data," Journal of KIISE : Database, Vol. 41, No. 3, pp. 145- 154, Jun. 2014. (in Korean)
- D. Liu, S. Wang, "Programmable Order-Preserving Secure Index for Encrypted Database Query," IEEE 5th International Conference on Cloud Computing, 2012.
- R. C. Merkle, "A certified digital signature," Proc. of CRYPTO 1989, Santa Barbara, CA, USA, Aug. 1989.
- E. Mykletun, M. Narasimha, G. Tsudik, "Authentication and integrity in outsourced databases," Journal ACM Transactions on Storage (TOS), Vol. 2, No. 2, pp. 107-138, May 2006.
- P. Devanbu, M. Gertz, C. Martel and S. Stubblebine, "Authentic data publication over the internet," Journal of Computer Security, Vol. 11, No. 3, pp. 291- 314, 2003.
- M. Narasimha, G. Tsudik, "Authentication of outsourced databases using signature aggregation and chaining," Proc. of DASFAA, 2006.
- J. Wang, X. Du, J. Lu and W. Lu, "Bucket‐based authentication for outsourced databases," Concurrency and Computation: Practice and Experience, Vol. 22, No. 9, pp. 1160-1180, 2010. https://doi.org/10.1002/cpe.1566
- R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
- M. Jang, M. Yoon and J. Chang, "A Query Result Integrity Auditing Method based on Bitmap Encryption for Spatial Database Outsourcing," Journal of KIISE : Database, Vol. 41, No. 1, pp. 28-36, Feb. 2014. (in Korean)
- Y Theodoridis, R. Jefferson, O. Silva, and M. A. Nascimento, "On the Generation of Spatiotemporal Datasets," Proc. of SSTD, Vol. 1651, pp. 147-164, 1999.