Skip to main content
Erschienen in: The VLDB Journal 5/2017

29.06.2017 | Regular Paper

Secret sharing for cloud data security: a survey

verfasst von: Varunya Attasena, Jérôme Darmont, Nouria Harbi

Erschienen in: The VLDB Journal | Ausgabe 5/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud technologies. Various approaches, i.e., data encryption, anonymization, replication and verification, help enforce different facets of data security. Secret sharing is a particularly interesting cryptographic technique. Its most advanced variants indeed simultaneously enforce data privacy, availability and integrity, while allowing computation on encrypted data. The aim of this paper is thus to wholly survey secret sharing schemes with respect to data security, data access and costs in the pay-as-you-go paradigm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Uniquely relatively primes are random prime numbers that are related to each other by some conditions.
 
2
A is a Jordan normal form of D if \(DY=YA\), where Y is a row matrix and A is a square, upper triangular matrix whose entries are all the same integer values on the diagonal, all 1 on the entries immediately above the diagonal, and 0 elsewhere.
 
Literatur
1.
Zurück zum Zitat Agrawal, D., Abbadi, A.E., Emekci, F., Metwally, A.: database management as a service: challenges and opportunities. In: 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China, pp. 1709–1716 (2009) Agrawal, D., Abbadi, A.E., Emekci, F., Metwally, A.: database management as a service: challenges and opportunities. In: 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China, pp. 1709–1716 (2009)
2.
Zurück zum Zitat Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)MathSciNetCrossRef Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)MathSciNetCrossRef
3.
Zurück zum Zitat Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)MathSciNetCrossRef Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)MathSciNetCrossRef
4.
Zurück zum Zitat Attasena, V., Harbi, N., Darmont, J.: fVSS: A new secure and cost-efficient scheme for cloud data warehouses. In: ACM 17th International Conference on Data Warehouses and OLAP (DOLAP 2014), Shanghai, China, pp. 81–90. ACM (2014) Attasena, V., Harbi, N., Darmont, J.: fVSS: A new secure and cost-efficient scheme for cloud data warehouses. In: ACM 17th International Conference on Data Warehouses and OLAP (DOLAP 2014), Shanghai, China, pp. 81–90. ACM (2014)
5.
Zurück zum Zitat Attasena, V.: Secret Sharing Approaches for Secure Data Warehousing and On-Line Analysis Processing in the Cloud. Ph.D. thesis, Université Lumière Lyon 2, France (2015) Attasena, V.: Secret Sharing Approaches for Secure Data Warehousing and On-Line Analysis Processing in the Cloud. Ph.D. thesis, Université Lumière Lyon 2, France (2015)
6.
Zurück zum Zitat Attasena, V., Harbi, N., Darmont, J.: A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud. Int. J. Data Warehous. Min. 11(2), 21–42 (2015)CrossRef Attasena, V., Harbi, N., Darmont, J.: A novel multi-secret sharing approach for secure data warehousing and on-line analysis processing in the cloud. Int. J. Data Warehous. Min. 11(2), 21–42 (2015)CrossRef
7.
Zurück zum Zitat Baron, J., Defrawy, K.E., Lampkins, J., Ostrovsky, R.: Communication-optimal proactive secret sharing for dynamic groups. Comput. Sci. Appl. Cryptogr. Netw. Secur. 9092, 23–41 (2016)MathSciNetMATH Baron, J., Defrawy, K.E., Lampkins, J., Ostrovsky, R.: Communication-optimal proactive secret sharing for dynamic groups. Comput. Sci. Appl. Cryptogr. Netw. Secur. 9092, 23–41 (2016)MathSciNetMATH
8.
Zurück zum Zitat Beimel, A.: Secret-sharing schemes: a survey. In: 3rd International Conference on Coding and Cryptology (IWCC 2011), Qingdao, China, pp. 11–46 (2011) Beimel, A.: Secret-sharing schemes: a survey. In: 3rd International Conference on Coding and Cryptology (IWCC 2011), Qingdao, China, pp. 11–46 (2011)
9.
Zurück zum Zitat Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography: the case of hashing and signing. In: 14th Annual International Cryptology Conference (CRYPTO 1994), Santa Barbara, USA, pp. 216–233 (1994) Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography: the case of hashing and signing. In: 14th Annual International Cryptology Conference (CRYPTO 1994), Santa Barbara, USA, pp. 216–233 (1994)
10.
Zurück zum Zitat Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: 8th Annual International Cryptology Conference (CRYPTO 1988), Santa Barbara, USA, pp. 27–35 (1990) Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: 8th Annual International Cryptology Conference (CRYPTO 1988), Santa Barbara, USA, pp. 27–35 (1990)
11.
Zurück zum Zitat Bilal, K., Malik, S.U.R., Khan, S.U., Zomaya, A.Y.: Trends and challenges in cloud datacenters. IEEE Cloud Comput. 1(1), 10–20 (2014)CrossRef Bilal, K., Malik, S.U.R., Khan, S.U., Zomaya, A.Y.: Trends and challenges in cloud datacenters. IEEE Cloud Comput. 1(1), 10–20 (2014)CrossRef
12.
Zurück zum Zitat Blakley, G.R., Meadows, C.A.: Security of ramp schemes. In: Advances in Cryptology (CRYPTO 1984), Santa Barbara, California, USA, Lecture Notes in Computer Science, vol. 196, pp. 242–268 (1985) Blakley, G.R., Meadows, C.A.: Security of ramp schemes. In: Advances in Cryptology (CRYPTO 1984), Santa Barbara, California, USA, Lecture Notes in Computer Science, vol. 196, pp. 242–268 (1985)
13.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. In: National Computer Conference (AFIPS 1979), Monval, USA, pp. 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. In: National Computer Conference (AFIPS 1979), Monval, USA, pp. 313–317 (1979)
14.
Zurück zum Zitat Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing: improvements and extensions. In: ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), Vienna, Austria, pp. 1292–1303 (2016) Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing: improvements and extensions. In: ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), Vienna, Austria, pp. 1292–1303 (2016)
15.
Zurück zum Zitat Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing. EUROCRYPT 2015(9057), 337–367 (2015)MathSciNetMATH Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing. EUROCRYPT 2015(9057), 337–367 (2015)MathSciNetMATH
16.
Zurück zum Zitat Bu, S., Yang, R.: Novel and effective multi-secret sharing scheme. In: International Conference on Information Engineering and Applications (IEA 2012), pp. 461–467 (2013) Bu, S., Yang, R.: Novel and effective multi-secret sharing scheme. In: International Conference on Information Engineering and Applications (IEA 2012), pp. 461–467 (2013)
17.
Zurück zum Zitat Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: the 9th ACM Conference on Computer and Communications Securit (CCS 2002), pp. 88–97 (2002) Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: the 9th ACM Conference on Computer and Communications Securit (CCS 2002), pp. 88–97 (2002)
18.
Zurück zum Zitat Chan, C.W., Chang, C.C.: A scheme for threshold multi-secret sharing. Appl. Math. Comput. 166(1), 1–14 (2005)MathSciNetMATH Chan, C.W., Chang, C.C.: A scheme for threshold multi-secret sharing. Appl. Math. Comput. 166(1), 1–14 (2005)MathSciNetMATH
19.
Zurück zum Zitat Chang, T.Y., Hwang, M.S., Yang, W.P.: An improvement on the lin-wu (t, n) threshold verifiable multi-secret sharing scheme. Appl. Math. Comput. 163(1), 169–178 (2005)MathSciNetMATH Chang, T.Y., Hwang, M.S., Yang, W.P.: An improvement on the lin-wu (t, n) threshold verifiable multi-secret sharing scheme. Appl. Math. Comput. 163(1), 169–178 (2005)MathSciNetMATH
20.
Zurück zum Zitat Chen, W., Long, X., Bai, Y., Gao, X.: A new dynamic threshold secret sharing scheme from bilinear maps. In: International Conference on Parallel Processing Workshops (ICPPW 2007), Xi-An, China, p. 19 (2007) Chen, W., Long, X., Bai, Y., Gao, X.: A new dynamic threshold secret sharing scheme from bilinear maps. In: International Conference on Parallel Processing Workshops (ICPPW 2007), Xi-An, China, p. 19 (2007)
21.
Zurück zum Zitat Chen, G., Wang, H., Wang, L., Jin, Y.: A distributed multi-secret sharing scheme on the (t,n) threshold. In: 2nd International Conference on Network Computing and Information Security (NCIS 2012), Shanghai, China, pp. 358–364 (2012) Chen, G., Wang, H., Wang, L., Jin, Y.: A distributed multi-secret sharing scheme on the (t,n) threshold. In: 2nd International Conference on Network Computing and Information Security (NCIS 2012), Shanghai, China, pp. 358–364 (2012)
22.
Zurück zum Zitat Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: 1st ACM Cloud Computing Security Workshop (CCSW 2009), Chicago, USA, pp. 85–90 (2009) Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: 1st ACM Cloud Computing Security Workshop (CCSW 2009), Chicago, USA, pp. 85–90 (2009)
23.
Zurück zum Zitat Chunming, T., an Yao, Z.: A new (t,n) threshold secret sharing scheme. In: International Conference on Advanced Computer Theory and Engineering (ICACTE 2008), Phuket, Thailand, pp. 920–924 (2008) Chunming, T., an Yao, Z.: A new (t,n) threshold secret sharing scheme. In: International Conference on Advanced Computer Theory and Engineering (ICACTE 2008), Phuket, Thailand, pp. 920–924 (2008)
24.
Zurück zum Zitat Cormode, G., Srivastava, D.: Anonymized data: generation, models, usage. In: 26th IEEE International Conference on Data Engineering (ICDE 2010), Long Beach, USA, pp. 1015–1018 (2010) Cormode, G., Srivastava, D.: Anonymized data: generation, models, usage. In: 26th IEEE International Conference on Data Engineering (ICDE 2010), Long Beach, USA, pp. 1015–1018 (2010)
25.
Zurück zum Zitat Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)MathSciNetCrossRefMATH Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993–996 (2010)MathSciNetCrossRefMATH
26.
Zurück zum Zitat Dautrich, J.L., Ravishankar, C.V.: Security limitations of using secret sharing for data outsourcing. In: IFIP Annual Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, pp. 151–160 (2016) Dautrich, J.L., Ravishankar, C.V.: Security limitations of using secret sharing for data outsourcing. In: IFIP Annual Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, pp. 151–160 (2016)
27.
Zurück zum Zitat Dehkordi, M.H., Mashhadi, S.: An efficient threshold verifiable multi-secret sharing. Comput. Stand. Interfaces 30(3), 187–190 (2008)CrossRefMATH Dehkordi, M.H., Mashhadi, S.: An efficient threshold verifiable multi-secret sharing. Comput. Stand. Interfaces 30(3), 187–190 (2008)CrossRefMATH
28.
Zurück zum Zitat Dehkordi, M.H., Mashhadi, S.: New efficient and practical verifiable multi-secret sharing schemes. Inf. Sci. 178(9), 2262–2274 (2008)MathSciNetCrossRefMATH Dehkordi, M.H., Mashhadi, S.: New efficient and practical verifiable multi-secret sharing schemes. Inf. Sci. 178(9), 2262–2274 (2008)MathSciNetCrossRefMATH
29.
Zurück zum Zitat Derbeko, P., Dolev, S., Gudes, E., Sharma, S.: Security and privacy aspects in mapreduce on clouds: a survey. Comput. Sci. Rev. 20, 1–28 (2016)MathSciNetCrossRefMATH Derbeko, P., Dolev, S., Gudes, E., Sharma, S.: Security and privacy aspects in mapreduce on clouds: a survey. Comput. Sci. Rev. 20, 1–28 (2016)MathSciNetCrossRefMATH
30.
Zurück zum Zitat Ding, C., Pei, D., Salomaa, A.: Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific Publishing, Singapore (1996)CrossRefMATH Ding, C., Pei, D., Salomaa, A.: Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography. World Scientific Publishing, Singapore (1996)CrossRefMATH
31.
Zurück zum Zitat Dolev, S., Li, Y., Sharma, S.: Private and secure secret shared mapreduce (extended abstract). In: IFIP Annual Conference on Data and Applications Security and Privacy XXVI (DBSec 2012), Paris, France, pp. 145–160 (2016) Dolev, S., Li, Y., Sharma, S.: Private and secure secret shared mapreduce (extended abstract). In: IFIP Annual Conference on Data and Applications Security and Privacy XXVI (DBSec 2012), Paris, France, pp. 145–160 (2016)
32.
Zurück zum Zitat Dolev, S., ElDefrawy, K., Lampkins, J., Ostrovsky, R., Yung, M.: Proactive secret sharing with a dishonest majority. Comput. Sci. Secur. Cryptogr. Netw. 9841, 529–548 (2016)MathSciNetMATH Dolev, S., ElDefrawy, K., Lampkins, J., Ostrovsky, R., Yung, M.: Proactive secret sharing with a dishonest majority. Comput. Sci. Secur. Cryptogr. Netw. 9841, 529–548 (2016)MathSciNetMATH
33.
Zurück zum Zitat Drgan, C.C., iplea, F.L.: Distributive weighted threshold secret sharing schemes. Inf. Sci. 339, 85–97 (2016)MathSciNetCrossRef Drgan, C.C., iplea, F.L.: Distributive weighted threshold secret sharing schemes. Inf. Sci. 339, 85–97 (2016)MathSciNetCrossRef
34.
Zurück zum Zitat Dwork, C.: Differential privacy. In: International Colloquium of Automata, Languages and Programming (ICALP 2006), Venice, Italy, pp. 1–12 (2006) Dwork, C.: Differential privacy. In: International Colloquium of Automata, Languages and Programming (ICALP 2006), Venice, Italy, pp. 1–12 (2006)
35.
Zurück zum Zitat Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, USA, pp. 27–37 (2006) Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, USA, pp. 27–37 (2006)
36.
Zurück zum Zitat Emekci, F., Agrawal, D., Abbadi, A.E.: Abacus: a distributed middleware for privacy preserving data sharing across private data warehouses. In: 6th International Conference on Middleware (USENIX 2005), Grenoble, France, pp. 21–41 (2005) Emekci, F., Agrawal, D., Abbadi, A.E.: Abacus: a distributed middleware for privacy preserving data sharing across private data warehouses. In: 6th International Conference on Middleware (USENIX 2005), Grenoble, France, pp. 21–41 (2005)
37.
Zurück zum Zitat Eslami, Z., Ahmadabadi, J.Z.: A verifiable multi-secret sharing scheme based on cellular automata. Inf. Sci. 180(15), 2889–2894 (2010)MathSciNetCrossRefMATH Eslami, Z., Ahmadabadi, J.Z.: A verifiable multi-secret sharing scheme based on cellular automata. Inf. Sci. 180(15), 2889–2894 (2010)MathSciNetCrossRefMATH
38.
Zurück zum Zitat Eslami, Z., Rad, S.K.: A new verifiable multi-secret sharing scheme based on bilinear maps. Wirel. Person. Commun. 63(2), 459–467 (2012)CrossRef Eslami, Z., Rad, S.K.: A new verifiable multi-secret sharing scheme based on bilinear maps. Wirel. Person. Commun. 63(2), 459–467 (2012)CrossRef
39.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st Annual ACM Symposium on Theory of Computing (STOC 2009), Bethesda, USA, pp. 169–178 (2009) Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st Annual ACM Symposium on Theory of Computing (STOC 2009), Bethesda, USA, pp. 169–178 (2009)
40.
Zurück zum Zitat Gong, G., Harn, L., Wu, H.: The gh public-key cryptosystem. Selected areas in cryptography. Spinger 2259, 284–300 (2001)MATH Gong, G., Harn, L., Wu, H.: The gh public-key cryptosystem. Selected areas in cryptography. Spinger 2259, 284–300 (2001)MATH
41.
Zurück zum Zitat Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inf. Theory 45(7), 2601–2605 (1999)MathSciNetCrossRefMATH Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inf. Theory 45(7), 2601–2605 (1999)MathSciNetCrossRefMATH
42.
Zurück zum Zitat Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: As5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: ESORICS DPM/SETOP 2012 International Workshops, Pisa, Italy, pp. 201–216 (2012) Hadavi, M.A., Damiani, E., Jalili, R., Cimato, S., Ganjei, Z.: As5: a secure searchable secret sharing scheme for privacy preserving database outsourcing. In: ESORICS DPM/SETOP 2012 International Workshops, Pisa, Italy, pp. 201–216 (2012)
43.
Zurück zum Zitat Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing: towards a more practical solution. In: VLDB 2010 Ph.D. Workshop, Singapore, pp. 54–59 (2010) Hadavi, M.A., Jalili, R.: Secure data outsourcing based on threshold secret sharing: towards a more practical solution. In: VLDB 2010 Ph.D. Workshop, Singapore, pp. 54–59 (2010)
44.
Zurück zum Zitat Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th IEEE Annual Conference on Computer Software and Applications Conference Workshops (COMPSACW 2012), Izmir, Turkey, pp. 415–420 (2012) Hadavi, M.A., Noferesti, M., Jalili, R., Damiani, E.: Database as a service: towards a unified solution for security requirements. In: 36th IEEE Annual Conference on Computer Software and Applications Conference Workshops (COMPSACW 2012), Izmir, Turkey, pp. 415–420 (2012)
45.
Zurück zum Zitat Harn, L., Fuyou, M.: Weighted secret sharing based on the chinese remainder theorem. Netw. Secur. 16(6), 420–425 (2014)MATH Harn, L., Fuyou, M.: Weighted secret sharing based on the chinese remainder theorem. Netw. Secur. 16(6), 420–425 (2014)MATH
47.
Zurück zum Zitat Hashizume, K., Rosado, D.G., Fernndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. Internet Serv. Appl. 4(1), 1–13 (2013)CrossRef Hashizume, K., Rosado, D.G., Fernndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. Internet Serv. Appl. 4(1), 1–13 (2013)CrossRef
48.
Zurück zum Zitat He, Z., Wong, W.K., Kao, B., Cheung, D.W.L.: Sdb: A secure query processing system with data interoperability. In: the 41st International Conference on Very Large Data Bases, Hawaii, USA, pp. 1876–1879 (2015) He, Z., Wong, W.K., Kao, B., Cheung, D.W.L.: Sdb: A secure query processing system with data interoperability. In: the 41st International Conference on Very Large Data Bases, Hawaii, USA, pp. 1876–1879 (2015)
49.
Zurück zum Zitat He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591–1592 (1994)CrossRef He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591–1592 (1994)CrossRef
50.
Zurück zum Zitat Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: 15th Annual international cryptology conference (CRYPTO 1995), Santa Barbara, USA, pp. 339–352 (1995) Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: How to cope with perpetual leakage. In: 15th Annual international cryptology conference (CRYPTO 1995), Santa Barbara, USA, pp. 339–352 (1995)
51.
Zurück zum Zitat Hu, C., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on LFSR sequences. Theor. Comput. Sci. 445, 52–62 (2012)MathSciNetCrossRefMATH Hu, C., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on LFSR sequences. Theor. Comput. Sci. 445, 52–62 (2012)MathSciNetCrossRefMATH
52.
Zurück zum Zitat Hwang, R., Chang, C.: An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13), 1170–1176 (1998)CrossRef Hwang, R., Chang, C.: An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13), 1170–1176 (1998)CrossRef
53.
Zurück zum Zitat Iftene, S.: General secret sharing based on the chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci. 186, 67–84 (2007)MathSciNetCrossRefMATH Iftene, S.: General secret sharing based on the chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci. 186, 67–84 (2007)MathSciNetCrossRefMATH
54.
Zurück zum Zitat Hazewinkel, M. (ed.): Totient Function. Encyclopedia of Mathematics. Springer, Heidelberg (2001) Hazewinkel, M. (ed.): Totient Function. Encyclopedia of Mathematics. Springer, Heidelberg (2001)
55.
Zurück zum Zitat Iwamoto, M., Yamamoto, H.: Strongly secure ramp secret sharing schemes for general access structures. Inf. Process. Lett. 97(2), 52–57 (2006)MathSciNetCrossRefMATH Iwamoto, M., Yamamoto, H.: Strongly secure ramp secret sharing schemes for general access structures. Inf. Process. Lett. 97(2), 52–57 (2006)MathSciNetCrossRefMATH
56.
Zurück zum Zitat Joshi, J.B., Takabi, H., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8, 24–31 (2010)CrossRef Joshi, J.B., Takabi, H., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8, 24–31 (2010)CrossRef
57.
Zurück zum Zitat Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)CrossRef Khan, M.A.: A survey of security issues for cloud computing. J. Netw. Comput. Appl. 71, 11–29 (2016)CrossRef
58.
Zurück zum Zitat Kher, V., Kim, Y.: Securing distributed storage: challenges, techniques, and systems. In: ACM Workshop on Storage Security and Survivability (StorageSS 2005), Fairfax, USA, pp. 9–25 (2005) Kher, V., Kim, Y.: Securing distributed storage: challenges, techniques, and systems. In: ACM Workshop on Storage Security and Survivability (StorageSS 2005), Fairfax, USA, pp. 9–25 (2005)
59.
Zurück zum Zitat Komargodski, I., Zhandry, M.: Cutting-edge cryptography through the lens of secret sharing. EUROCRYPT 2015(9563), 449–479 (2015)MATH Komargodski, I., Zhandry, M.: Cutting-edge cryptography through the lens of secret sharing. EUROCRYPT 2015(9563), 449–479 (2015)MATH
60.
Zurück zum Zitat Li, S., Lai, H., Wu, W., Jiang, S.: Novel space efficient secret sharing for implicit data security. In: 8th International Conference on Information Science and Digital Content Technology (ICIDT 2012), Jeju, Japan, pp. 283–286 (2009) Li, S., Lai, H., Wu, W., Jiang, S.: Novel space efficient secret sharing for implicit data security. In: 8th International Conference on Information Science and Digital Content Technology (ICIDT 2012), Jeju, Japan, pp. 283–286 (2009)
61.
Zurück zum Zitat Lin, T.-Y., Wu, T.-C.: (t, n) Threshold verifiable multi secret sharing scheme based on factorisation intractability and discrete logarithm modulo a composite problems. IEEE Comput. Digit. Tech. 146(5), 263–264 (1999) Lin, T.-Y., Wu, T.-C.: (t, n) Threshold verifiable multi secret sharing scheme based on factorisation intractability and discrete logarithm modulo a composite problems. IEEE Comput. Digit. Tech. 146(5), 263–264 (1999)
62.
Zurück zum Zitat Liu, Y.X., Harn, L., Yang, C.N., Zhang, Y.Q.: Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6), 1325–1332 (2012)CrossRef Liu, Y.X., Harn, L., Yang, C.N., Zhang, Y.Q.: Efficient (n, t, n) secret sharing schemes. J. Syst. Softw. 85(6), 1325–1332 (2012)CrossRef
63.
Zurück zum Zitat Mashhadi, S.: Secure publicly verifiable and proactive secret sharing schemes with general access structure. Inf. Sci. 378, 99–108 (2017)MathSciNetCrossRef Mashhadi, S.: Secure publicly verifiable and proactive secret sharing schemes with general access structure. Inf. Sci. 378, 99–108 (2017)MathSciNetCrossRef
64.
Zurück zum Zitat Morillo, P., Padr, C., Sez, G., Villar, J.: Weighted threshold secret sharing schemes. Inf. Process. Lett. 70(5), 211–216 (1999)MathSciNetCrossRefMATH Morillo, P., Padr, C., Sez, G., Villar, J.: Weighted threshold secret sharing schemes. Inf. Process. Lett. 70(5), 211–216 (1999)MathSciNetCrossRefMATH
65.
Zurück zum Zitat Muhil, M., Krishna, U., Kumar, R., Anita, E.A.M.: Securing multi-cloud using secret sharing algorithm. In: IFIP Annual Conference on Application of Fuzzy Systems and Soft Computing (ICAFS 2016), Vienna, Austria, pp. 145–160 (2016) Muhil, M., Krishna, U., Kumar, R., Anita, E.A.M.: Securing multi-cloud using secret sharing algorithm. In: IFIP Annual Conference on Application of Fuzzy Systems and Soft Computing (ICAFS 2016), Vienna, Austria, pp. 145–160 (2016)
66.
Zurück zum Zitat Nojoumian, M., Stinson, D.R.: Social secret sharing in cloud computing using a new trust function. In: 10th Annual International Conference on Privacy, Security and Trust (PST 2012), Paris, France, pp. 161–167 (2012) Nojoumian, M., Stinson, D.R.: Social secret sharing in cloud computing using a new trust function. In: 10th Annual International Conference on Privacy, Security and Trust (PST 2012), Paris, France, pp. 161–167 (2012)
67.
Zurück zum Zitat Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: 3rd International Conference Decision and Game Theory for Security (GameSec 2012), Budapest, Hungary, pp. 18–37 (2012) Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: 3rd International Conference Decision and Game Theory for Security (GameSec 2012), Budapest, Hungary, pp. 18–37 (2012)
68.
Zurück zum Zitat Nojoumian, M., Stinson, D.R., Grainger, M.: Unconditionally secure social secret sharing scheme. Inf. Secur. IET 4(4), 202–211 (2010)CrossRef Nojoumian, M., Stinson, D.R., Grainger, M.: Unconditionally secure social secret sharing scheme. Inf. Secur. IET 4(4), 202–211 (2010)CrossRef
69.
Zurück zum Zitat Oktay, K.Y., Mehrotra, S., Khadilkar, V., Kantarcioglu, M.: Semrod: Secure and efficient mapreduce over hybrid clouds. In: International Conference on Management of Data (SIGMOD 2015), Melbourne, Australia, pp. 153–166 (2015) Oktay, K.Y., Mehrotra, S., Khadilkar, V., Kantarcioglu, M.: Semrod: Secure and efficient mapreduce over hybrid clouds. In: International Conference on Management of Data (SIGMOD 2015), Melbourne, Australia, pp. 153–166 (2015)
70.
Zurück zum Zitat Padmanabhan, P., Gruenwald, L., Vallur, A., Atiquzzaman, M.: A survey of data replication techniques for mobile ad hoc network databases. VLDB J. 17(5), 1143–1164 (2008)CrossRef Padmanabhan, P., Gruenwald, L., Vallur, A., Atiquzzaman, M.: A survey of data replication techniques for mobile ad hoc network databases. VLDB J. 17(5), 1143–1164 (2008)CrossRef
71.
Zurück zum Zitat Pal, D., Khethavath, P., Thomas, J.P.: Multilevel threshold secret sharing in distributed cloud. Secur. Comput. Commun. 536, 13–23 (2015)CrossRef Pal, D., Khethavath, P., Thomas, J.P.: Multilevel threshold secret sharing in distributed cloud. Secur. Comput. Commun. 536, 13–23 (2015)CrossRef
72.
Zurück zum Zitat Parakh, A., Kak, S.: Online data storage using implicit security. Inf. Sci. 179(19), 3323–3331 (2009)CrossRefMATH Parakh, A., Kak, S.: Online data storage using implicit security. Inf. Sci. 179(19), 3323–3331 (2009)CrossRefMATH
73.
Zurück zum Zitat Parakh, A., Kak, S.: Space efficient secret sharing for implicit data security. Inf. Sci. 181(2), 335–341 (2011)MathSciNetCrossRef Parakh, A., Kak, S.: Space efficient secret sharing for implicit data security. Inf. Sci. 181(2), 335–341 (2011)MathSciNetCrossRef
74.
Zurück zum Zitat Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT 1991), Brighton, UK, pp. 522–526 (1991) Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT 1991), Brighton, UK, pp. 522–526 (1991)
75.
Zurück zum Zitat Perlner, R.A., Cooper, D.A.: Quantum resistant public key cryptography: a survey. In: 8th Symposium on Identity and Trust on the Internet (IDtrust 2009), Gaithersburg, Maryland, USA, ACM ICPS, pp. 85–93 (2009) Perlner, R.A., Cooper, D.A.: Quantum resistant public key cryptography: a survey. In: 8th Symposium on Identity and Trust on the Internet (IDtrust 2009), Gaithersburg, Maryland, USA, ACM ICPS, pp. 85–93 (2009)
76.
Zurück zum Zitat Runhual, S., Liusheng, H., yonglong, L., Hong2, Z.: A threshold multi-secret sharing scheme. In: IEEE International Conference on Networking, Sensing and Control (ICNSC 2008), Sanya, China, pp. 1705–1707 (2008) Runhual, S., Liusheng, H., yonglong, L., Hong2, Z.: A threshold multi-secret sharing scheme. In: IEEE International Conference on Networking, Sensing and Control (ICNSC 2008), Sanya, China, pp. 1705–1707 (2008)
78.
Zurück zum Zitat ShanYue, B., Hong, Z.: A secret sharing scheme based on NTRU algorithm. In: Wireless Communications, Networking and Mobile Computing (WiCom 2009), Beijing, China, pp. 1–4 (2009) ShanYue, B., Hong, Z.: A secret sharing scheme based on NTRU algorithm. In: Wireless Communications, Networking and Mobile Computing (WiCom 2009), Beijing, China, pp. 1–4 (2009)
79.
Zurück zum Zitat Shao, J., Cao, Z.: A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme. Appl. Math. Comput. 168(1), 135–140 (2005)MathSciNetMATH Shao, J., Cao, Z.: A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme. Appl. Math. Comput. 168(1), 135–140 (2005)MathSciNetMATH
80.
Zurück zum Zitat Shen, F., Hai Jiang, C.M., Xu, Z.: Towards secure and reliable data storage with multi-coefficient secret sharing. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, UK, pp. 797–802 (2010) Shen, F., Hai Jiang, C.M., Xu, Z.: Towards secure and reliable data storage with multi-coefficient secret sharing. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, UK, pp. 797–802 (2010)
81.
Zurück zum Zitat Shi, R., Zhong, H., Huang, L.: A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. In: International Conference on InterSoftware Engineering, Artifificial Intelligence, Networking, and Parallel/Distributed (ACIS 2007), pp. 9–13 (2007) Shi, R., Zhong, H., Huang, L.: A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. In: International Conference on InterSoftware Engineering, Artifificial Intelligence, Networking, and Parallel/Distributed (ACIS 2007), pp. 9–13 (2007)
82.
Zurück zum Zitat Sion, R.: Secure data outsourcing. In: 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, pp. 1431–1432 (2007) Sion, R.: Secure data outsourcing. In: 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, pp. 1431–1432 (2007)
83.
Zurück zum Zitat Takahashi, S., Iwamura, K.: Secret sharing scheme suitable for cloud computing. In: 27th International Conference on Advanced Information Networking and Applications (AINA 2013), Barcelona, Spain, pp. 530–536 (2013) Takahashi, S., Iwamura, K.: Secret sharing scheme suitable for cloud computing. In: 27th International Conference on Advanced Information Networking and Applications (AINA 2013), Barcelona, Spain, pp. 530–536 (2013)
84.
Zurück zum Zitat Takahashi, S., Iwamura, K.: Secret sharing scheme suitable for cloud computing. In: International Conference on Advanced Information Networking and Applications (AINA 2013), Barcelona, Spain, pp. 530–537 (2013) Takahashi, S., Iwamura, K.: Secret sharing scheme suitable for cloud computing. In: International Conference on Advanced Information Networking and Applications (AINA 2013), Barcelona, Spain, pp. 530–537 (2013)
85.
Zurück zum Zitat Tang, C., Yao, Z.: Definition and construction of multi-prover zero-knowledge arguments. In: International Conference on Communications and Mobile Computing (CMC 2009), Yunnan, China, pp. 375–379 (2009) Tang, C., Yao, Z.: Definition and construction of multi-prover zero-knowledge arguments. In: International Conference on Communications and Mobile Computing (CMC 2009), Yunnan, China, pp. 375–379 (2009)
86.
Zurück zum Zitat Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: 9th International Symposium on Privacy Enhancing Technologies (PETS 2009), Seattle, USA, pp. 185–201 (2009) Thompson, B., Haber, S., Horne, W.G., Sander, T., Yao, D.: Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: 9th International Symposium on Privacy Enhancing Technologies (PETS 2009), Seattle, USA, pp. 185–201 (2009)
87.
Zurück zum Zitat Wang, S., Agrawal, D., Abbadi, A.E.: A comprehensive framework for secure query processing on relational data in the cloud. In: 8th VLDB International Conference on Secure Data Management (SDM 2011), Berlin, Germany, pp. 52–69 (2011) Wang, S., Agrawal, D., Abbadi, A.E.: A comprehensive framework for secure query processing on relational data in the cloud. In: 8th VLDB International Conference on Secure Data Management (SDM 2011), Berlin, Germany, pp. 52–69 (2011)
88.
Zurück zum Zitat Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: 14th European Conference on Research in Computer Security (ESORICS 2009), Saint-Malo, France, pp. 355–370 (2009) Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: 14th European Conference on Research in Computer Security (ESORICS 2009), Saint-Malo, France, pp. 355–370 (2009)
89.
Zurück zum Zitat Wang, S.J., Tsai, Y.R., Shen, C.C.: Verifiable threshold scheme in multi-secret sharing distributions upon extensions of ECC. Wirel. Person. Comun. 56(1), 173–182 (2011)CrossRef Wang, S.J., Tsai, Y.R., Shen, C.C.: Verifiable threshold scheme in multi-secret sharing distributions upon extensions of ECC. Wirel. Person. Comun. 56(1), 173–182 (2011)CrossRef
90.
Zurück zum Zitat Waseda, A., Soshi, M.: Consideration for multi-threshold multi-secret sharing schemes. In: 2012 International Symposium on Information Theory and its Applications (ISITA 2012), Honolulu, USA, pp. 265–269 (2012) Waseda, A., Soshi, M.: Consideration for multi-threshold multi-secret sharing schemes. In: 2012 International Symposium on Information Theory and its Applications (ISITA 2012), Honolulu, USA, pp. 265–269 (2012)
91.
Zurück zum Zitat Wei, D.S., Murugesan, S., Kuo, S.Y., Naik, K., Krizanc, D.: Enhancing data integrity and privacy in the cloud: an agenda. IEEE Comput. 46(11), 87–90 (2013)CrossRef Wei, D.S., Murugesan, S., Kuo, S.Y., Naik, K., Krizanc, D.: Enhancing data integrity and privacy in the cloud: an agenda. IEEE Comput. 46(11), 87–90 (2013)CrossRef
92.
Zurück zum Zitat Wong, T.M., Wang, C., Wing, J.M.: Verifiable secret redistribution for archive systems. In: International IEEE Security in Storage Workshop, pp. 94–106 (2002) Wong, T.M., Wang, C., Wing, J.M.: Verifiable secret redistribution for archive systems. In: International IEEE Security in Storage Workshop, pp. 94–106 (2002)
93.
Zurück zum Zitat Xu, Z., Martin, K., Kotnik, C.: A survey of security services and techniques in distributed storage systems. In: 2011 International Conference on Security and Management (SAM 2011), Las Vegas, USA, pp. 3–9 (2011) Xu, Z., Martin, K., Kotnik, C.: A survey of security services and techniques in distributed storage systems. In: 2011 International Conference on Security and Management (SAM 2011), Las Vegas, USA, pp. 3–9 (2011)
94.
Zurück zum Zitat Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483–490 (2004)MathSciNetMATH Yang, C.C., Chang, T.Y., Hwang, M.S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483–490 (2004)MathSciNetMATH
95.
Zurück zum Zitat Yao, A.C.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, pp. 162–167 (1986) Yao, A.C.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, pp. 162–167 (1986)
96.
Zurück zum Zitat Zhang, C., Chang, E.C., Yap, R.H.: Tagged-mapreduce: a general framework for secure computing with mixed-sensitivity data on hybrid clouds. In: International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014), Chicago, IL, USA, pp. 31–40 (2014) Zhang, C., Chang, E.C., Yap, R.H.: Tagged-mapreduce: a general framework for secure computing with mixed-sensitivity data on hybrid clouds. In: International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014), Chicago, IL, USA, pp. 31–40 (2014)
97.
Zurück zum Zitat Zhang, F., Chen, H.: Security-preserving live migration of virtual machines in the cloud. Netw. Syst. Manag. 21(4), 562–587 (2013)CrossRef Zhang, F., Chen, H.: Security-preserving live migration of virtual machines in the cloud. Netw. Syst. Manag. 21(4), 562–587 (2013)CrossRef
98.
Zurück zum Zitat Zhao, J., Zhang, J., Zhao, R.: A practical verifiable multi-secret sharing scheme. Comput. Stand. Interfaces 29(1), 138–141 (2007) Zhao, J., Zhang, J., Zhao, R.: A practical verifiable multi-secret sharing scheme. Comput. Stand. Interfaces 29(1), 138–141 (2007)
99.
Zurück zum Zitat Zhao, D., Peng, H., Wang, C., Yang, Y.: A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4), 611615 (2012)MathSciNetCrossRefMATH Zhao, D., Peng, H., Wang, C., Yang, Y.: A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4), 611615 (2012)MathSciNetCrossRefMATH
100.
Zurück zum Zitat Zheng, T., Wu, H., Lin, H.W., Pan, J.: Application of belief learning model based socio-rational secret sharing scheme on cloud storage. In: 6th International Conference on Genetic and Evolutionary Computing (ICGEC 2012), Kitakyushu, Japan, pp. 15–18 (2012) Zheng, T., Wu, H., Lin, H.W., Pan, J.: Application of belief learning model based socio-rational secret sharing scheme on cloud storage. In: 6th International Conference on Genetic and Evolutionary Computing (ICGEC 2012), Kitakyushu, Japan, pp. 15–18 (2012)
101.
Zurück zum Zitat Zhou, Z., Zhang, H., Du, X., Li, P., Yu, X.: Prometheus: privacy-aware data retrieval on hybrid cloud. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, pp. 2643–2651 (2013) Zhou, Z., Zhang, H., Du, X., Li, P., Yu, X.: Prometheus: privacy-aware data retrieval on hybrid cloud. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, pp. 2643–2651 (2013)
102.
Zurück zum Zitat Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. In: International Conference on Semantics, Knowledge and Grids (SKG 2010), Beijing, China, pp. 105–112 (2010) Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. In: International Conference on Semantics, Knowledge and Grids (SKG 2010), Beijing, China, pp. 105–112 (2010)
103.
Zurück zum Zitat Zhou, L., Schneider, F.B., Renesse, R.V.: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 259–286 (2005)CrossRef Zhou, L., Schneider, F.B., Renesse, R.V.: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 259–286 (2005)CrossRef
104.
Zurück zum Zitat Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gen. Comput. Syst. 28(3), 583–592 (2012)CrossRef Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gen. Comput. Syst. 28(3), 583–592 (2012)CrossRef
Metadaten
Titel
Secret sharing for cloud data security: a survey
verfasst von
Varunya Attasena
Jérôme Darmont
Nouria Harbi
Publikationsdatum
29.06.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
The VLDB Journal / Ausgabe 5/2017
Print ISSN: 1066-8888
Elektronische ISSN: 0949-877X
DOI
https://doi.org/10.1007/s00778-017-0470-9

Weitere Artikel der Ausgabe 5/2017

The VLDB Journal 5/2017 Zur Ausgabe

Premium Partner