{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T11:44:45Z","timestamp":1771501485673,"version":"3.50.1"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2012,8]]},"abstract":"<jats:p>Cloud computing becomes a successful paradigm for data computing and storage. Increasing concerns about data security and privacy in the cloud, however, have emerged. Ensuring security and privacy for data management and query processing in the cloud is critical for better and broader uses of the cloud. This tutorial covers some common cloud security and privacy threats and the relevant research, while focusing on the works that protect data confidentiality and query access privacy for sensitive data being stored and queried in the cloud. We provide a comprehensive study of state-of-the-art schemes and techniques for protecting data confidentiality and access privacy, which make different tradeoffs in the multidimensional space of security, privacy, functionality and performance.<\/jats:p>","DOI":"10.14778\/2367502.2367569","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"2028-2029","source":"Crossref","is-referenced-by-count":12,"title":["Secure and privacy-preserving data services in the cloud"],"prefix":"10.14778","volume":"5","author":[{"given":"Divyakant","family":"Agrawal","sequence":"first","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA"}]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA"}]},{"given":"Shiyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"UC Santa Barbara, Santa Barbara, CA"}]}],"member":"320","published-online":{"date-parts":[[2012,8]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"563","volume-title":"SIGMOD","author":"Agrawal R.","year":"2004","unstructured":"R. Agrawal , J. Kiernan , R. Srikant , and Y. Xu . Order preserving encryption for numeric data . In SIGMOD , pages 563 -- 574 , 2004 . 10.1145\/1007568.1007632 R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Order preserving encryption for numeric data. In SIGMOD, pages 563--574, 2004. 10.1145\/1007568.1007632"},{"key":"e_1_2_1_2_1","first-page":"205","volume-title":"SIGMOD","author":"Bajaj S.","year":"2011","unstructured":"S. Bajaj and R. Sion . TrustedDB: a trusted hardware based database with privacy and data confidentiality . In SIGMOD , pages 205 -- 216 , 2011 . 10.1145\/1989323.1989346 S. Bajaj and R. Sion. TrustedDB: a trusted hardware based database with privacy and data confidentiality. In SIGMOD, pages 205--216, 2011. 10.1145\/1989323.1989346"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/948109.948124","volume-title":"CCS","author":"Damiani E.","year":"2003","unstructured":"E. Damiani , S. D. C. di Vimercati , S. Jajodia , S. Paraboschi , and P. Samarati . Balancing confidentiality and efficiency in untrusted relational DBMSs . In CCS , pages 93 -- 102 , 2003 . 10.1145\/948109.948124 E. Damiani, S. D. C. di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In CCS, pages 93--102, 2003. 10.1145\/948109.948124"},{"key":"e_1_2_1_5_1","first-page":"710","volume-title":"ICDCS","author":"di Vimercati S. De Capitani","year":"2011","unstructured":"S. De Capitani di Vimercati , S. Foresti , S. Paraboschi , G. Pelosi , and P. Samarati . Efficient and private access to outsourced data . In ICDCS , pages 710 -- 719 , 2011 . 10.1109\/ICDCS.2011.37 S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati. Efficient and private access to outsourced data. In ICDCS, pages 710--719, 2011. 10.1109\/ICDCS.2011.37"},{"key":"e_1_2_1_6_1","first-page":"519","volume-title":"VLDB","author":"Ge T.","year":"2007","unstructured":"T. Ge and S. B. Zdonik . Answering aggregation queries in a secure system model . In VLDB , pages 519 -- 530 , 2007 . T. Ge and S. B. Zdonik. Answering aggregation queries in a secure system model. In VLDB, pages 519--530, 2007."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"SIGMOD","author":"Hacigumus H.","year":"2002","unstructured":"H. Hacigumus , B. R. Iyer , C. Li , and S. Mehrotra . Executing SQL over encrypted data in the database service provider model . In SIGMOD , pages 216 -- 227 , 2002 . 10.1145\/564691.564717 H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra. Executing SQL over encrypted data in the database service provider model. In SIGMOD, pages 216--227, 2002. 10.1145\/564691.564717"},{"key":"e_1_2_1_9_1","first-page":"720","volume-title":"VLDB","author":"Hore B.","year":"2004","unstructured":"B. Hore , S. Mehrotra , and G. Tsudik . A privacy-preserving index for range queries . In VLDB , pages 720 -- 731 , 2004 . B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB, pages 720--731, 2004."},{"key":"e_1_2_1_10_1","first-page":"364","volume-title":"FOCS","author":"Kushilevitz E.","year":"1997","unstructured":"E. Kushilevitz and R. Ostrovsky . Replication is not needed: Single database, computationally-private information retrieval . In FOCS , pages 364 -- 373 , 1997 . E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In FOCS, pages 364--373, 1997."},{"key":"e_1_2_1_11_1","first-page":"158","volume-title":"Financial Cryptography","author":"Olumofin F. G.","year":"2011","unstructured":"F. G. Olumofin and I. Goldberg . Revisiting the computational practicality of private information retrieval . In Financial Cryptography , pages 158 -- 172 , 2011 . 10.1007\/978-3-642-27576-0_13 F. G. Olumofin and I. Goldberg. Revisiting the computational practicality of private information retrieval. In Financial Cryptography, pages 158--172, 2011. 10.1007\/978-3-642-27576-0_13"},{"key":"e_1_2_1_12_1","first-page":"514","volume-title":"STOC","author":"Ostrovsky R.","year":"1990","unstructured":"R. Ostrovsky . Efficient computation on oblivious RAMs . In STOC , pages 514 -- 523 , 1990 . 10.1145\/100216.100289 R. Ostrovsky. Efficient computation on oblivious RAMs. In STOC, pages 514--523, 1990. 10.1145\/100216.100289"},{"key":"e_1_2_1_13_1","first-page":"223","volume-title":"EUROCRYPT","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . Public-key cryptosystems based on composite degree residuosity classes . In EUROCRYPT , pages 223 -- 238 , 1999 . P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223--238, 1999."},{"key":"e_1_2_1_14_1","first-page":"85","volume-title":"SOSP","author":"Popa R. A.","year":"2011","unstructured":"R. A. Popa , C. M. S. Redfield , N. Zeldovich , and H. Balakrishnan . CryptDB: protecting confidentiality with encrypted query processing . In SOSP , pages 85 -- 100 , 2011 . 10.1145\/2043556.2043566 R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: protecting confidentiality with encrypted query processing. In SOSP, pages 85--100, 2011. 10.1145\/2043556.2043566"},{"key":"e_1_2_1_15_1","first-page":"199","volume-title":"CCS","author":"Ristenpart T.","year":"2009","unstructured":"T. Ristenpart , E. Tromer , H. Shacham , and S. Savage . Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds . In CCS , pages 199 -- 212 , 2009 . 10.1145\/1653662.1653687 T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In CCS, pages 199--212, 2009. 10.1145\/1653662.1653687"},{"key":"e_1_2_1_16_1","volume-title":"NDSS Symposium","author":"Sion R.","year":"2007","unstructured":"R. Sion and B. Carbunar . On the computational practicality of private information retrieval . In NDSS Symposium , 2007 . R. Sion and B. Carbunar. On the computational practicality of private information retrieval. In NDSS Symposium, 2007."},{"key":"e_1_2_1_17_1","first-page":"1","volume-title":"DBSec","author":"Wang S.","year":"2010","unstructured":"S. Wang , D. Agrawal , and A. E. Abbadi . Generalizing pir for practical private retrieval of public data . In DBSec , pages 1 -- 16 , 2010 . S. Wang, D. Agrawal, and A. E. Abbadi. Generalizing pir for practical private retrieval of public data. In DBSec, pages 1--16, 2010."},{"key":"e_1_2_1_18_1","first-page":"52","volume-title":"SDM","author":"Wang S.","year":"2011","unstructured":"S. Wang , D. Agrawal , and A. El Abbadi . A comprehensive framework for secure query processing on relational data in the cloud . In SDM , pages 52 -- 69 , 2011 . S. Wang, D. Agrawal, and A. El Abbadi. A comprehensive framework for secure query processing on relational data in the cloud. In SDM, pages 52--69, 2011."},{"key":"e_1_2_1_19_1","volume-title":"NDSS Symposium","author":"Williams P.","year":"2008","unstructured":"P. Williams and R. Sion . Usable private information retrieval . In NDSS Symposium , 2008 . P. Williams and R. Sion. Usable private information retrieval. In NDSS Symposium, 2008."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/2367502.2367569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T00:01:27Z","timestamp":1716854487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/2367502.2367569"}},"subtitle":["a data centric view"],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":19,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["10.14778\/2367502.2367569"],"URL":"https:\/\/doi.org\/10.14778\/2367502.2367569","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2012,8]]}}}