A security aware stream data processing scheme on the cloud and its eficient execution methods

Katsuhiro Tomiyama, Hideyuki Kawashima, Hiroyuki Kitagawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In order to process a few thousands of streams in real-time, public clouds seem to be an excellent choice since it supports massively amount of computing resources. A public cloud may be managed by a third party and outside the firewall of the organization, which may make it questionable whether data are managed conffidentially. This paper proposes a scheme that evaluates queries over encrypted data streams. Our scheme is based on CryptDB and its modification. We describe performance issues incurred by our scheme, and propose an approach to reduce the encryption costs and amounts of transmitted data size, and an approach to reduce memory usage by analyzing a plan tree in an SPE. The result of experiments showed that applying AP-1 reduces 90 % memory size, while applying AP-2 reduces 11 % memory size.

Original languageEnglish
Title of host publicationCloudDB'12 - Proceedings of the 3rd ACM International Workshop on Cloud Data Management, Co-located with CIKM 2012
Pages59-66
Number of pages8
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event3rd ACM International Workshop on Cloud Data Management, CloudDB 2012 - Co-located with CIKM 2012 - Maui, HI, United States
Duration: 2012 Oct 292012 Oct 29

Publication series

NameInternational Conference on Information and Knowledge Management, Proceedings

Other

Other3rd ACM International Workshop on Cloud Data Management, CloudDB 2012 - Co-located with CIKM 2012
Country/TerritoryUnited States
CityMaui, HI
Period12/10/2912/10/29

Keywords

  • Data Stream Processing
  • Encryption
  • Relational Operators

ASJC Scopus subject areas

  • Decision Sciences(all)
  • Business, Management and Accounting(all)

Fingerprint

Dive into the research topics of 'A security aware stream data processing scheme on the cloud and its eficient execution methods'. Together they form a unique fingerprint.

Cite this