2013), as well as completely different solutions such
as RASP (Xu et al., 2014). Our future work is to
adapt some of these schemes and observe their per-
formance versus the security they provide, using the
proposed methodology. We believe that our work can
be an important first step for positive outcomes in the
research and exploration of such new solutions for
pub/sub confidentiality.
REFERENCES
Barazzutti, R., Felber, P., Mercier, H., Onica, E., and
Riviere, E. (2017). Efficient and confidentiality-
preserving content-based publish/subscribe with pre-
filtering. IEEE Transactions on Dependable and Se-
cure Computing, 14(3).
Bernstein, P. A. and Newcomer, E. (2009). Principles of
transaction processing. Elsevier/Morgan Kaufmann
Publishers, Amsterdam, Netherlands; Boston, USA.
Choi, S., Ghinita, G., and Bertino, E. (2010). A privacy-
enhancing content-based publish/subscribe system us-
ing scalar product preserving transformations. In Pro-
ceedings of the 21st Database and Expert Systems Ap-
plications, DEXA 2010.
Eugster, P. T., Felber, P., Guerraoui, R., and Kermarrec, A.-
M. (2003). The many faces of publish/subscribe. ACM
Computing Surveys, 35(2).
Han, Y., Chan, J., Alpcan, T., and Leckie, C. (2017). Using
virtual machine allocation policies to defend against
co-resident attacks in cloud computing. IEEE Trans-
actions on Dependable and Secure Computing, 14(1).
Mofrad, S., Zhang, F., Lu, S., and Shi, W. (2018). A com-
parison study of Intel SGX and AMD memory encryp-
tion technology. In Proceedings of the 7th Interna-
tional Workshop on Hardware and Architectural Sup-
port for Security and Privacy, HASP 2018.
Narus, S. P., Rahman, N., Mann, D. K., He, S., and
Haug, P. J. (2018). Enhancing a commercial EMR
with an open, standards-based publish-subscribe in-
frastructure. AMIA Annual Symposium Proceedings,
2018.
Onica, E., Felber, P., Mercier, H., and Rivi
`
ere, E.
(2015). Efficient key updates through subscription re-
encryption for privacy-preserving publish/subscribe.
In Proceedings of the 16th ACM/IFIP Annual Middle-
ware Conference, Middleware 2015.
Onica, E., Felber, P., Mercier, H., and Rivi
`
ere, E. (2016).
Confidentiality-preserving publish/subscribe: A sur-
vey. ACM Computing Surveys, 49(2).
Pires, R., Pasin, M., Felber, P., and Fetzer, C. (2016). Secure
content-based routing using Intel software guard ex-
tensions. In Proceedings of the 17th ACM/IFIP Inter-
national Middleware Conference, Middleware 2016.
Raiciu, C. and Rosenblum, D. S. (2006). Enabling confiden-
tiality in content-based publish/subscribe infrastruc-
tures. In Proceedings of the Second IEEE/CreatNet
International Conference on Security and Privacy in
Communication Networks, Securecomm 2006.
Ristenpart, T., Tromer, E., Shacham, H., and Savage, S.
(2009). Hey, you, get off of my cloud: exploring infor-
mation leakage in third-party compute clouds. In Pro-
ceedings of the 16th ACM Conference on Computer
and Communications Security, CCS 2009.
Tzouramanis, T. (2017). Secure range query processing
over untrustworthy cloud services. In Proceedings of
the 21st International Database Engineering & Appli-
cations Symposium, IDEAS 2017.
Tzouramanis, T. and Manolopoulos, Y. (2018). Secure
reverse k-nearest neighbours search over encrypted
multi-dimensional databases. In Proceedings of the
22nd International Database Engineering & Applica-
tions Symposium, IDEAS 2018.
Van Bulck, J., Minkin, M., Weisse, O., Genkin, D., Kasikci,
B., Piessens, F., Silberstein, M., Wenisch, T. F.,
Yarom, Y., and Strackx, R. (2018). Foreshadow: Ex-
tracting the keys to the Intel SGX kingdom with tran-
sient out-of-order execution. In Proceedings of the
27th USENIX Security Symposium.
Varadarajan, V., Zhang, Y., Ristenpart, T., and Swift, M.
(2015). A placement vulnerability study in multi-
tenant public clouds. In Proceedings of the 24th
USENIX Security Symposium.
Wong, W. K., Cheung, D. W.-l., Kao, B., and Mamoulis,
N. (2009). Secure kNN computation on encrypted
databases. In Proceedings of the 35th ACM SIGMOD
International Conference on Management of Data,
SIGMOD 2009.
Xu, H., Guo, S., and Chen, K. (2014). Building confidential
and efficient query services in the cloud with RASP
data perturbation. IEEE Transactions on Knowledge
and Data Engineering, 26(2).
Yang, L. T. (2010). Research in Mobile Intelligence: Mo-
bile Computing and Computational Intelligence. John
Wiley & Sons, Hoboken, USA.
Zhu, Y., Huang, Z., and Takagi, T. (2016). Secure and
controllable kNN query over encrypted cloud data
with key confidentiality. Journal of Parallel and Dis-
tributed Computing, 89.
Zhu, Y., Xu, R., and Takagi, T. (2013). Secure kNN query
on encrypted cloud database without key-sharing. In-
ternational Journal of Electronic Security and Digital
Forensics, 5(3/4).
ICSOFT 2019 - 14th International Conference on Software Technologies
682