You are not logged in.

Query verification schemes for cloud-hosted databases: a brief survey

Riaz-ud-Din, Faizal, Zhou, Wanlei and Doss, Robin 2016, Query verification schemes for cloud-hosted databases: a brief survey, International journal of parallel, emergent and distributed systems, vol. 31, no. 6, pp. 543-561, doi: 10.1080/17445760.2015.1132421.

Attached Files
Name Description MIMEType Size Downloads

Title Query verification schemes for cloud-hosted databases: a brief survey
Author(s) Riaz-ud-Din, Faizal
Zhou, WanleiORCID iD for Zhou, Wanlei orcid.org/0000-0002-1680-2521
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Journal name International journal of parallel, emergent and distributed systems
Volume number 31
Issue number 6
Start page 543
End page 561
Total pages 19
Publisher Taylor & Francis
Place of publication Abingdon, Eng.
Publication date 2016
ISSN 1744-5760
1744-5779
Keyword(s) query verification
database-as-a-service
untrusted server
cloud security
survey
Summary Database query verification schemes provide correctness guarantees for database queries. Typically such guarantees are required and advisable where queries are executed on untrusted servers. This need to verify query results, even though they may have been executed on one’s own database, is something new that has arisen with the advent of cloud services. The traditional model of hosting one’s own databases on one’s own servers did not require such verification because the hardware and software were both entirely within one’s control, and therefore fully trusted. However, with the economical and technological benefits of cloud services beckoning, many are now considering outsourcing both data and execution of database queries to the cloud, despite obvious risks. This survey paper provides an overview into the field of database query verification and explores the current state of the art in terms of query execution and correctness guarantees provided for query results. We also provide indications towards future work in the area.
Language eng
DOI 10.1080/17445760.2015.1132421
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2016, Taylor & Francis
Persistent URL http://hdl.handle.net/10536/DRO/DU:30082022

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 107 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Thu, 28 Apr 2016, 17:41:51 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.