Please use this identifier to cite or link to this item: https://doi.org/10.21256/zhaw-3775
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSpillner, Josef-
dc.contributor.authorBeck, Martin-
dc.contributor.authorSchill, Alexander-
dc.contributor.authorBohnert, Thomas Michael-
dc.date.accessioned2018-06-21T08:23:55Z-
dc.date.available2018-06-21T08:23:55Z-
dc.date.issued2015-
dc.identifier.isbn978-0-7695-5697-0de_CH
dc.identifier.urihttps://digitalcollection.zhaw.ch/handle/11475/7131-
dc.description.abstractSensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments.de_CH
dc.language.isoende_CH
dc.publisherIEEEde_CH
dc.rightsLicence according to publishing contractde_CH
dc.subjectDispersionde_CH
dc.subjectCloud computingde_CH
dc.subjectStealth computingde_CH
dc.subject.ddc004: Informatikde_CH
dc.titleStealth databases : ensuring user-controlled queries in untrusted cloud environmentsde_CH
dc.typeKonferenz: Paperde_CH
dcterms.typeTextde_CH
zhaw.departementSchool of Engineeringde_CH
zhaw.organisationalunitInstitut für Informatik (InIT)de_CH
dc.identifier.doi10.21256/zhaw-3775-
zhaw.conference.details8th IEEE/ACM International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015de_CH
zhaw.funding.euNode_CH
zhaw.originated.zhawYesde_CH
zhaw.pages.end270de_CH
zhaw.pages.start261de_CH
zhaw.publication.statusacceptedVersionde_CH
zhaw.publication.reviewPeer review (Publikation)de_CH
zhaw.title.proceedings2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015de_CH
zhaw.webfeedService Engineeringde_CH
Appears in collections:Publikationen School of Engineering

Files in This Item:
File Description SizeFormat 
stealthdatabases-archive.pdf810.89 kBAdobe PDFThumbnail
View/Open
Show simple item record
Spillner, J., Beck, M., Schill, A., & Bohnert, T. M. (2015). Stealth databases : ensuring user-controlled queries in untrusted cloud environments [Conference paper]. 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–270. https://doi.org/10.21256/zhaw-3775
Spillner, J. et al. (2015) ‘Stealth databases : ensuring user-controlled queries in untrusted cloud environments’, in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. IEEE, pp. 261–270. Available at: https://doi.org/10.21256/zhaw-3775.
J. Spillner, M. Beck, A. Schill, and T. M. Bohnert, “Stealth databases : ensuring user-controlled queries in untrusted cloud environments,” in 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 2015, pp. 261–270. doi: 10.21256/zhaw-3775.
SPILLNER, Josef, Martin BECK, Alexander SCHILL und Thomas Michael BOHNERT, 2015. Stealth databases : ensuring user-controlled queries in untrusted cloud environments. In: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015. Conference paper. IEEE. 2015. S. 261–270. ISBN 978-0-7695-5697-0
Spillner, Josef, Martin Beck, Alexander Schill, and Thomas Michael Bohnert. 2015. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” Conference paper. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, 261–70. IEEE. https://doi.org/10.21256/zhaw-3775.
Spillner, Josef, et al. “Stealth Databases : Ensuring User-Controlled Queries in Untrusted Cloud Environments.” 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Limassol, Cyprus, 7-10 December 2015, IEEE, 2015, pp. 261–70, https://doi.org/10.21256/zhaw-3775.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.