References
- C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Transactions on Computers, vol. 62, no. 2, pp. 362-375, 2013. https://doi.org/10.1109/TC.2011.245
- N. H. Yu, Z. Hao, J. J. Xu, W. M. Zhang, and C. Zhang, "Review of cloud computing security," Dianzi Xuebao (Acta Electronica Sinica), vol. 41, no. 2, pp. 371-381, 2013.
- R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: protecting confidentiality with encrypted query processing," in Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, Portugal, 2011, pp. 85-100.
- R. A. Popa, F. H. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," in Proceedings of 2013 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2013, pp. 463-477.
- R. A. Popa and N. Zeldovich, "Cryptographic treatment of CryptDB's adjustable join," Massachusetts Institute of Technology, Cambridge, MA, Technical Report No. MIT-CSAIL-TR-2012-006, 2012.
- C. Curino, E. P. Jones, R. A. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishna, and N. Zeldovich, "Relational cloud: a database-as-a-service for the cloud," in Proceedings of 5th Biennial Conference on Innovation Data Systems Research (CIDR), Asilomar, CA, 2011, pp. 235-240.
- R. A. Popa, N. Zeldovich, and H. Balakrishnan, "CryptDB: a practical encrypted relational DBMS," Massachusetts Institute of Technology, Cambridge, MA, Technical Report No. MIT-CSAIL-TR-2011-005, 2011.
- S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, "Processing analytical queries over encrypted data," Proceedings of the VLDB Endowment, vol. 6, no. 5, pp. 289-300, 2013. https://doi.org/10.14778/2535573.2488336
- W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, and S. M. Yiu, "Secure query processing with data interoperability in a cloud database environment," in Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, Snowbird, UT, 2014, pp. 1395-1406.
- Z. He, W. K. Wong, B. Kao, D. W. L. Cheung, R. Li, S. M. Yiu, and E. Lo, "SDB: a secure query processing system with data interoperability," Proceedings of the VLDB Endowment, vol. 8, no. 12, pp. 1876-1879, 2015. https://doi.org/10.14778/2824032.2824090
- S. Bajaj and R. Sion, "Trusteddb: a trusted hardware-based database with privacy and data confidentiality," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 3, pp. 752-765, 2014. https://doi.org/10.1109/TKDE.2013.38
- R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004, pp. 563-574.
- H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, WI, 2002, pp. 216-227.
- A. C. Yao, "Protocols for secure computations," in Proceedings of 23rd Annual Symposium on Foundations of Computer Science (SFCS), Chicago, IL, 1982, pp. 160-164.
- D. Bogdanov, R. Jagomagis, and S. Laur, "A universal toolkit for cryptographically secure privacy-preserving data mining," in Pacific-Asia Workshop on Intelligence and Security Informatics. Heidelberg: Springer, 2012, pp. 112-126.
- H. Hacigumus, B. Iyer, and S. Mehrotra, "Providing database as a service," in Proceedings of 18th International Conference on Data Engineering, San Jose, CA, 2002, pp. 29-38.
- K. Kaur, K. S. Dhindsa, and G. Singh, "Numeric to numeric encryption of databases: using 3Kdec algorithm," in Proceedings of IEEE International Advance Computing Conference, Patiala, India, 2009, pp. 1501-1505.
- G. L. Xiang, X. M. Chen, P. Zhu, and J. Ma, "A method of homomorphic encryption," Wuhan University Journal of Natural Sciences, vol. 11, no. 1, pp. 181-184, 2006. https://doi.org/10.1007/BF02831727
- C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), Bethesda, MD, 2009, pp. 169-178.
- M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers," in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2010, pp. 24-43.
- Z. Brakerski, C. Gentry, and S. Halevi, "Packed ciphertexts in LWE-based homomorphic encryption," in Public-Key Cryptography-PKC 2013. Heidelberg: Springer, 2013, pp. 1-13.
- Z. Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE," SIAM Journal on Computing, vol. 43, no. 2, pp. 831-871, 2014. https://doi.org/10.1137/120868669
- C. Gentry, A. Sahai, and B. Waters, "Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based," in Advances in Cryptology-CRYPTO 2013. Heidelberg: Springer, 2013, pp. 75-92.
- P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology-EUROCRYPT '99. Heidelberg: Springer, 1999, pp. 223-238.