• Title/Summary/Keyword: database outsourcing

Search Result 24, Processing Time 0.029 seconds

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

A Study on Degree of Understanding Toward Outsourcing of Technical Processing in University Library (목록 업무의 아웃소싱에 대한 인식도 연구)

  • 김포옥;노옥림
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.1
    • /
    • pp.145-171
    • /
    • 2004
  • This study aims at understanding in detail the process of constructing database from outsourced cataloging by investigating the actual conditions of university libraries nationwide regarding the outsourcing of cataloging processing that are being carried out in technical processing. And librarians' opinions about the cataloging inserted by outsourcing companies are considered and revised in depth. Also the degree of understanding of outsourcing company staffs regarding the cataloging is investigated then compared to that of library processing staffs and the difference is analyzed. Coupled with that, degree of understanding about CIP of National Library of Korea and functionality of reference cataloging of Korea Education & Research Information Service(KERIS) is investigated, thus the future directions to which technical processing of library should move forward are presented.

Differences in the Performance of Outsourcing among the Cooperation Types Between Vendors and Clients (업체간 협력형태에 따른 아웃소싱의 성과 차이)

  • 김진균;오재인
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.10a
    • /
    • pp.93-98
    • /
    • 1999
  • IS 아웃소싱(Outsourcing)이 일반인들에게 관심을 끌기 시작한 것은 1989년 코닥(Kodak)사의 CIO(Chief Information Officer)였던 캐더린 허드슨이 연간 예산 4,000억 원인 자신의 정보시스템 부서의 업무를 IBM, DEC 그리고 Business Land에 아웃소싱하면서부터 이다(Applegate, 1991).

  • PDF

A Comparative Study of IT Outsourcing Research in Korea and China on Author Bibliographic Coupling Analysis (저자서지결합분석을 통한 한중 IT 아웃소싱 연구 비교)

  • Hyoung Jin Min;Sung Sik Park;Yuchen Jin
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.1-20
    • /
    • 2020
  • This study uses the bibliometric analysis and author bibliographic coupling analysis (ABCA) to analyse the study of IT outsourcing in Korea and China by 2017 and determine the subject areas of the researcher and the intellectual structure which lays the foundation for future researchers in IT outsourcing area. For this study, through the National Digital Science Library (NDSL) of Korea and China Academic Journal network publishing Database (CAJD) of China, it collected the connected documents and found out authors whose work had been published more than twice. ABCA is utilized to visualize the author map which could find out the researchers and areas in meaningful way. The result show that the study of IT outsourcing in Korea came out earlier and developed further than that of China. The study in Korea has already come to the mature period. By contrast, China remains at somewhere between developing period and bottleneck period. The distribution of papers are still in the dispersed state. The author map shows a hot subject area in Korean researchers IT outsourcing strategy is and in chinese scholars IT outsourcing management.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

  • Liu, Guoxiu;Yang, Geng;Wang, Haiwei;Dai, Hua;Zhou, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3375-3400
    • /
    • 2018
  • With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. However, it has become a challenging work to provide security to database as service model in cloud computing, because adversaries may try to gain access to sensitive data, and curious or malicious administrators may capture and leak data. In order to realize privacy preservation, sensitive data should be encrypted before outsourcing. In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. The proposed system can store and process the floating point numbers without compromising the security of data. To balance tradeoff between data privacy protection and query processing efficiency, QSDB utilizes three different encryption models to encrypt data. Our strategy is to process as much queries as possible at the cloud server. Encryption of queries and decryption of encrypted queries results are performed at client. Experiments on the real-world data sets were conducted to demonstrate the efficiency and practicality of the proposed system.

Partnership : A Critical Factor of Outsourcing (파트너쉽: 아웃소싱의 핵심 요인)

  • 정승렬;신영철
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.297-308
    • /
    • 2000
  • 오늘날 아웃소싱의 사상과 전략은 여러 형태의 새로운 정보전략 및 비즈니스 전략을 창출해 내고 있으며 그 적용 영역에 있어서도 특정 정보시스템 분야에서 일반 경영 측면으로까지 확장되어 가는 추세이다. 본 논문은 이와 같은 다양한 범위의 아웃소싱 스펙트럼 모두에 적용되는 성공 요인으로 파트너쉽을 도출하고 이것과 아웃소싱 성공과의 관계를 살펴본다. 특히 파트너쉽의 다섯가지 속성인 신뢰도, 협력도, 의사소통, 계약조건의 명확도, 갈등정도 등이 아웃소싱 성공의 여러 차원인 전략적 이익, 경제적 이익, 업무 만족도 등에 어떻게 영향을 미치는 지를 살펴보았다.

  • PDF