Efficient and Secure Query Evaluation Over Encrypted XML Databases

Total Page:16

File Type:pdf, Size:1020Kb

Efficient and Secure Query Evaluation Over Encrypted XML Databases Secure Query Answering and Privacy-preserving Data Publishing by Hui Wang B.Sc, Wuhan University, P.R.China, 1998 M.Sc, The University of British Columbia, 2002 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy in The Faculty of Graduate Studies (Computer Science) The University Of British Columbia October, 2007 © Hui Wang 2007 ii Abstract The last several decades have witnessed a phenomenal growth in the network• ing infrastructure connecting computers all over the world. The Web has now become an ubiquitous channel for information sharing and dissemination. More and more data is being exchanged and published on the Web. This growth has created a whole new set of research challenges, while giving a new spin to some existing onefs. For example, XML (extensible Markup Language), a self-describing and semi-structured data format, has emerged as the standard for representing and exchanging data between applications across the Web. An important issue of data publishing is the protection of sensitive and private information. However, security/privacy-enhancing techniques bring disadvan• tages: security-enhancing techniques may incur overhead for query answering, while privacy-enhancing techniques may ruin data utility. In this thesis, we study how to overcome such overhead. Specifically, we address the following two problems in this thesis: (a) efficient and secure query evaluation over pub• lished XML databases, and (b) publishing relational databases while protecting privacy and preserving utility. The first part of this thesis focuses on efficiency and security issues of query evaluation over XML databases. To protect sensitive information in the pub: lished database, security policies must be defined and enforced, which will result in unavoidable overhead. Due to the security overhead and the complex struc• ture of XML databases, query evaluation may become inefficient. In this thesis, we study how to securely and efficiently evaluate queries over XML databases. First, we consider the access-controlled database. We focus on a security model by which every XML element either is locally assigned a security level or inher• its the security level from one of its ancestors. Security checks in this model can cause considerable overhead for query evaluation. We investigate how to reduce the security overhead by analyzing the subtle interactions between in• heritance of security levels and the structure of the XML database. We design a sound and complete set of rules and develop efficient, polynomial-time algo• rithms for optimizing security checks on queries. Second, we consider encrypted XML database in a "database-as-service" model, in which the private database is hosted by an untrusted server. Since the untrusted server has no decryption key, its power of query processing is very limited, which results in inefficient query evaluation. We study how to support secure and efficient query evalua• tion in this model. We design the metadata that will be hosted on the server side with the encrypted database. We show that the presence of the metadata not only facilitates query processing but also guarantees data security. We prove Abstract iii that by observing a series of queries from the client and responses by itself, the server's knowledge about the sensitive information in the database is always below a given security threshold. The second part of this thesis studies the problem of preserving both pri• vacy and the utility when publishing relational databases. To preserve utility, the published data will not be perturbed. Instead, the base table in the orig• inal database will be decomposed into several view tables. First, we define a general framework to measure the likelihood of privacy breach of a published view. We propose two attack models, unrestricted and restricted models, and derive formulas to quantify the privacy breach for each model. Second, we take utility into consideration. Specifically, we study the problem of how to design the scheme of published views, so that data privacy is protected while maximum utility is guaranteed. Given a database and its scheme, there are exponentially many candidates for published views that satisfy both privacy and utility con• straints. We prove that finding the globally optimal safe and faithful view, i.e., the view that does not violate any privacy constraints and provides the maxi• mum utility, is NP-hard. We propose the locally optimal safe and faithful view as the heuristic, and show how we can efficiently find a locally optimal safe and faithful view in polynomial time. iv Contents Abstract ii Contents iv List of Figures viii Acknowledgements xi Dedication xiii 1 Introduction 1 1.1 Efficient and Secure Evaluation of Queries over XML Database . 1 1.1.1 Efficient and Secure Evaluation of Queries over Access- Controlled XML Databases 2 1.1.2 Efficient and Secure Evaluation of Queries over Encrypted XML Databases 4 1.2 Privacy-and-utility-preserving Data Publishing 6 2 Background 9 2.1 extensible Markup Language(XML) 9 2.1.1 Document Type Definition (DTD) 11 2.1.2 XML Tree Pattern Queries (TPQ) 13 2.1.3 Structural Join: Efficient Evaluation of XML Queries . 14 2.1.4 XPath Query Containment • • • • 15 2.2 XML Encryption 16 2.3 K-anonymity 16 3 Query Evaluation over Access-controlled XML Databases . 20 3.1 Related Work 22 3.1.1 XML Access-Control Models 22 3.1.2 Efficient Enforcement Mechanisms 24 3.1.2.1 Authorization Views 24 3.1.2.2 Access-control Index 25 3.1.2.3 Static Analysis 26 3.1.2.4 Query Evaluation and Rewriting 26 3.2 Model and Problem 27 3.2.1 Security and Authorization Model 27 Contents v 3.2.2 Multi-level Security and Authorization 28 3.2.3 SC Annotations and Problem Statement 29 3.3 Definitions and Conventions 30 3.4 DAG-structured DTD Graphs 31 3.4.1 Root Rule • 32 3.4.2 Parent-Child(PC) Rule 33 3.4.3 Child-Parent(CP) Rule 34 3.4.4 Cousin-cousin(CC) Rule 34 3.4.4.1 Unconstrained Nodes 35 3.4.4.2 Constrained Nodes 36 3.4.5 Putting It All Together • 40 3.5 DAG-Structured DTDs with Disjunction 43 3.5.1 The Challenges 43 3.5.2 Optimizing against Disjunction DTDs . 45 3.5.3 Modified Rules 46 3.5.4 Algorithm DisjunctionOpt 48 3.5.5 Theoretical Results of Disjunction DTDs 49 3.6 Experiments 49 3.6.1 Experimental Setup 50 3.6.2 Impact of Optimization 50 3.6.3 Optimization Overhead 52 3.7 Summary 53 4 Query Evaluation over Encryption XML Databases 56 4.1 Related Work 59 4.2 Security Issues 60 4.2.1 Encryption Scheme 60 4.2.2 Security Constraints 61 4.2.3 Prior Knowledge and Attack Model 62 4.2.4 Security Definitions 63 4.3 Encryption Scheme 66 4.3.1 Secure Encryption Scheme 66 4.3.2 Optimal Secure Encryption Scheme 69 4.4 Metadata on Server 70 4.4.1 Structural Index 70 4.4.2 Representing DSI index 72 4.4.3 Value Index 76 4.4.3.1 Order-preserving Encryption with Splitting, Scal• ing and Noise 77 4.5 Query Processing • • 84 4.5.1 Query Translation at the Client 84 4.5.2 Query Translation at the Server 85 4.5.3 Security of Query Answering 86 4.5.4 Query Post-Processing 90 4.6 Activities on Client Side 91 4.6.1 Key Management 91 Contents vi 4.6.2 Client's Benefit 92 4.7 Experimental Evaluation 92 4.7.1 Experimental Setup 93 4.7.2 Our Approach vs. Naive Method ; . 94 4.7.3 Division of Work between Client and Server 94 4.7.4 Effect of Query Size 95 4.7.5 Effect of Various Encryption Schemes 95 4.8 Summary 96 5 Probabilistic Analysis of Privacy Leakage of Published Views 100 5.1 Related Work 103 5.2 Security Model 104 5.2.1 Private Association 104 5.2.2 Attack Models 104 5.2.2.1 Unrestricted Attack Model 104 5.2.2.2 Restricted Attack Model 105 5.2.2.3 Probability of Privacy Breach 106 5.3 Connectivity Graph 106 5.3.1 Two-View-Table Case 107 5.3.2 K-View-Table Case 108 5.4 Measurement of Probability of Privacy Breach 108 5.4.1 Two-View-Table Case 109 5.4.2 K-view-table Case 113 5.5 Summary 114 6 Privacy and Utility Preserving Data Publishing by Views . 115 6.1 Related Work 116 6.2 Security Model 117 6.2.1 Private and Public Associations 117 6.2.2 Association Cover, Privacy, and Utility 119 6.3 Faithful View Schemes 121 6.4 Connectivity Graph 122 6.4.1 The Concept 122 6.4.2 Traversing Connectivity Graph 125 6.5 View Lattice 126 6.5.1 The Concept 126 6.5.2 Properties of View Lattice 129 6.5.2.1 Monotonicity 129 6.5.2.2 Equivalence 130 6.5.3 Optimization of Search Strategy 133 6.6 Experiments 135 6.6.1 Experimental Setup 135 6.6.2 Size of Connectivity Graph 136 6.6.3 Locally Optimal Solution vs. Globally Optimal Solution . 137 6.6.4 Performance 137 6.6.5 Optimization 138 Contents vii 6.7 Summary 139 7 Conclusions and Future Work 140 7.1 Future Work 141 7.1.1 Efficient and Secure Query Evaluation 141 7.1.2 Privacy-preserving Data Publishing 141 Bibliography 143 A Proof 152 viii List of Figures 1.1 An Example of Encrypted XML Database 2 1.2 Example XMark-based DAG DTD .
Recommended publications
  • Design and Implementation of a Document Database Extension
    Design and Implementation of a Document Database Extension Stefania Leone1, Ela Hunt2, Thomas B. Hodel2, Michael Boehlen3, and Klaus R. Dittrich1 1 University of Zurich, Department of Informatics, Winterthurerstrasse 190, 8057 Zurich, Switzerland {leone,dittrich}@ifi.unizh.ch 2 Swiss Federal Institute of Technology (ETH Zurich), 8092 Zurich, Switzerland, [email protected], [email protected] 3 Free University of Bolzano-Bozen, Piazza Domenicani 3, 39100 Bolzano, Italy, [email protected] Abstract. Integration of text and documents into database manage- ment systems has been the subject of much research. However, most of the approaches are limited to data retrieval. Collaborative text editing, i.e. the ability for multiple users to work on a document instance simulta- neously, is rarely supported. Also, documents mostly consist of plain text only, and support very limited meta data storage or search. We address the problem by proposing an extended definition of document data type which comprises not only the text itself but also structural information such as layout, template and semantics, as well as document creation meta data. We implemented a new collaborative data type Document which supports document manipulation via a text editing API and ex- tended SQL syntax (TX SQL), as detailed in this work. We report also on the search capabilities of our document management system and present some of the future challenges for collaborative document management. 1 Introduction Text documents are produced by the million in companies, government offices and universities. Papers, reports and business documents contain a large part of an organization’s knowledge. These documents are mostly stored in a hierarchical folder structure on file servers, and are often difficult to find, even if a document management system is used.
    [Show full text]
  • Download Date 04/10/2021 15:09:36
    Database Metadata Requirements for Automated Web Development. A case study using PHP. Item Type Thesis Authors Mgheder, Mohamed A. Rights <a rel="license" href="http://creativecommons.org/licenses/ by-nc-nd/3.0/"><img alt="Creative Commons License" style="border-width:0" src="http://i.creativecommons.org/l/by- nc-nd/3.0/88x31.png" /></a><br />The University of Bradford theses are licenced under a <a rel="license" href="http:// creativecommons.org/licenses/by-nc-nd/3.0/">Creative Commons Licence</a>. Download date 04/10/2021 15:09:36 Link to Item http://hdl.handle.net/10454/4907 University of Bradford eThesis This thesis is hosted in Bradford Scholars – The University of Bradford Open Access repository. Visit the repository for full metadata or to contact the repository team © University of Bradford. This work is licenced for reuse under a Creative Commons Licence. Database Metadata Requirements for Automated Web Development Mohamed Ahmed Mgheder PhD 2009 i Database Metadata Requirements for Automated Web Development A case study using PHP Mohamed Ahmed Mgheder BSc. MSc. Submitted for the degree of Doctor of Philosophy Department of Computing School of Computing, Informatics and Media University of Bradford 2009 ii Acknowledgements I am very grateful to my Lord Almighty ALLAH who helped me and guided me throughout my life and made it possible. I could never have done it by myself! I would like to acknowledge with great pleasure the continued support, and valuable advice of my supervisor Mr. Mick. J. Ridley, who gave me all the encouragement to carry out this work. I owe my loving thanks to my wife, and my children.
    [Show full text]
  • Scalable Publish and Search Strategies for Effective Keyword- Based Database Search
    International Journal of Computer Science and Mathematical Theory ISSN 2545-5699 Vol. 4 No.1 2018 www.iiardpub.org Scalable Publish and Search Strategies for Effective Keyword- Based Database Search D.J.S. Sako & O.E. Taylor Department of Computer Science Rivers State University Port Harcourt, Nigeria. [email protected], [email protected] Abstract Data, the backbone of all enterprise application, is often locked up in one or more databases. Looking for particular information across multiple databases can be quite tedious and time consuming if all databases in the domain are all searched for information that may not be found in some of them. In this paper, we present an approach and the implementation of a system to query and search multiple relational databases to produce more effective and efficient result. Our approach depends on registering an existing database appilication with the system to enable the database or part of it for keyword search, identifying, ranking and searching only the published/registered databases relevant to a given query and is most likely to provide useful results. A database is relevant if it contains some information to participate to the answer of the raised query. The implication is that databases with zero or negative score do not contain the query terms and need not participate in the search process thereby reduceing the time required to search the databases for keywords, as only participating database(s) will be searched for query terms. We discussed the implementation of our system including results of experimental evaluation to demonstrate the scalability and effectiveness of our system.
    [Show full text]
  • Easycatalog for Adobe® Indesign®
    EASYCATALOG FOR ADOBE® INDEsiGN® RElaTIONal MODULE UsER GUIDE 65bit Software Ltd Revision History Version Date Remarks 1.0.0 02 May 2008 First draft. 1.0.1 08 August 2008 First release. © Copyright 2008 65bit Software Limited. All Rights reserved. Reproduction or copying prohibited. Adobe and InDesign are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. All other trademarks and copyrights are the property of their respective owners. CONTENTS CONTENTS OVERVIEW ........................................................5 Welcome .......................................................................................... 5 What is it? ........................................................................................ 5 Benefits ........................................................................................... 5 Installation ....................................................................................... 6 Assumptions .................................................................................... 6 Further assistance ........................................................................... 6 INTEGRATION ...................................................7 Overview .......................................................................................... 7 Prototyping ...................................................................................... 7 Seamless Integration ....................................................................... 7
    [Show full text]
  • Sql Server Management Studio Change View Schema
    Sql Server Management Studio Change View Schema Octavius refloats her choker healingly, true-blue and thermostable. Horsier and augmenting Ender nomarchiesimpone his toxiphobia phagocytosed drinks vulgarising reimplant great.offhanded. Churning and homothallic Marve impedes his On server schemas also change schema changes to preserve your apps galleries to. Here for database diagrams opened are. Take you change sql server instance of views can create text editor window will. Variable that schemas in sql servers can change your sql. Users and views, management studio provides great opportunity to manage grants privilege on the managed access to that situation will open the databases have a next. In schemas as a views. Ovaj domen je kupio i changed if the name of these steps. How sql server manage your report da li ste vi vlasnik ovog domena u srbiji i limit. What type defines which otherwise support from sql server manage data studio on sql server instance of views. These are limited by using the table, or responding to permissions being healthy would be aware that reference it? The sql servers can drop. The managed access to which leads to improve their own schema of data studio to. Schemabinding option set stores is schema change prefix table view is essential for a server schemas are organized into an important and changing. What temperature are similar database roles that make use sql server searches for each product topic page. The sql add a player with. What is schema views must modify view constraints, schemas are a managed grants without affecting any schema? With sql server manage and views; whereas a managed access layers.
    [Show full text]
  • BUILDING FAST and EFFICIENT DATABASE Applicanons FOR
    BUILDING FAST AND EFFICIENT DATABASE APPLICAnONS FOR THE WEB By XINXUEYUAN Bachelor ofCivil Engineering Beijing Polytechnic University Beijing, China 1990 Submitted to the Faculty ofthe Graduate College ofthe Oklahoma State University in partial Fulfillment of the requirements for the Degree of MASTER OF SCIENCE December, 2000 BUILDING FAST AND EFFICIENT DATABASE APPLICATIONS FOR THE WEB Thesis Approved: D hhesis Advisor JI ACKNOWLEDGEMENTS I wish to express my sincere appreciation to my thesis advisor, Dr. 1. Terry Nutter, for her intelligent supervision, constructive guidance, constant inspiration, and valuable time she has given me throughout this study. My sincere gratitude extends to Dr. John P. Chandler and Dr. George E. Hedrick for all the help and support they have given to me; their guidance, encouragement, assistance, and friendship are invaluable. I would like to give my respectful thanks to my parents, Mrs. Shuying Zhao and Mr. Shixian Yuan, for all the love and support they have given me throughout my life. [ would like to sincerely thank my two older brothers for their love, encouragement, support and confidence they have contributed to me. FinalIy, I would like to thank all the faculty of the Department of Computer Science for their support during my two and half year study here. III TABLE OF CONTENTS Chapter Page I INTRODUCTION 1 II LITERATURE REVIEW 5 Client-Server Technology 5 World Wide Web 6 Database and DBMS 8 SQL 8 Web Database Publishing Technology and Development Strategies 9 III roBC ARCHITECTURE AND WORKING MODELS 17 JDBC Architecture 17 JDBC Working Models 25 IV APPLICATION DESIGN, IMPLEMENTATION AND RESULTS 29 Computing Architecture Design 29 JDBC Components Design 31 Implementation Details 37 Results 47 VI CONCLUSION AND FUTURE WORK.
    [Show full text]
  • Export Table Ans Schema Sql Server
    Export Table Ans Schema Sql Server castigatingWinfield remains technically serrate: or belittleshe paunches any salutation. her sclerometers Drained Christian albumenise usually too drumblewaur? Hal some remains shops protolithic or elucidates after self-forgetfully.Domenic Content delivery network for serving web and video content. In sql server database publishing wizard. If you are going to import later into a lower version Oracle DB, and each schema hundreds of tables. Using ApexSQL Script a SQL Server data and schema scripting and. Include the date and time the incident requiring data recovery occurred and the type of incident that spurred your request. The Export and Import wizard can be used, the structure of the SQL Server main data storage unit, views and SQL Queries from Microsoft SQL Server and convert it into Snowflake. SQL table project a field mapping. Choose the path to export the file to, refresh databases in the Object Explorer in SSMS. Develop a wildcard can import and sql server, but need even export table or use here is as ideas about her existing database? Later use an export table for exports in sql server to export job. SQL Server INFORMATIONSCHEMA Views See more a Table Exists. Private Docker storage for container images on Google Cloud. You can improve productivity tools and procedures are your server export data with an excellent tool such as follows the worksheet is a unique destination. Is it possible to export a schema to a Word doc? Thank you for keeping in touch with us! Rehost, Access or CSV file into your SQL Server table.
    [Show full text]
  • Database Publishing in Adobe Framemaker 7.2
    WHITEPAPER Database Publishing in Adobe FrameMaker 7.2 TABLE OF CONTENTS Introduction 1 Introduction Database publishing is important to businesses of all sizes across all industries. For every 1 Applications of server-based publishing enterprise, information must be distributed internally and to the world at large. From 10 The FrameMaker database publishing company phone directories to online product catalogs, database publishing enables orga- solution nizations to communicate. A well-implemented database publishing system lets companies 17 Implementing a FrameMaker solution reduce cost, decrease publishing time, and increase information quality. 23 Next steps What is database publishing? 24 Appendix: Resources In general terms, database publishing is the automated transformation of source data into formats for presentation. In a typical database publishing application, content from multiple sources is aggregated and formatted for publishing to multiple formats, which can range from print and Adobe® PDF, to Hypertext Markup Language (HTML) on the World Wide Web, to Extensible Markup Language (XML) delivered to VoiceXML browsers and hand- held devices. Regardless of specific data sources, and particular format and delivery mechanisms, all forms of database publishing manifest some common and essential features: Data must be presented in a way so that users can easily find what they want; it must be formatted so presentation is effective; and presentation must often be customized for a particular target audience or even personalized for a single end user. The process of database publishing should be efficiently automated to meet the demand for timely delivery of consistently formatted information. Overview This whitepaper provides a general overview of database publishing and surveys imple- mentations by industry and document type.
    [Show full text]
  • Database Publishing in Adobe Framemaker 11
    Adobe® FrameMaker® 11 White Paper Database Publishing in Adobe FrameMaker 11 Introduction Contents Database publishing is important for businesses of all sizes in all industries. Every enterprise needs to 1 Introduction distribute information internally and externally. From company phone directories to online product catalogs 2 Applications of server- to 3D media content, database publishing enables timely, effective communication. A well-implemented based publishing database publishing system can help companies reduce the time and expenses associated with publishing 5 Document types and improve information quality. 8 Data sources 9 The FrameMaker What is database publishing? database publishing solution Database publishing is a form of automated media production in which source data resides in traditional databases 11 Implementing a (in the form of text, pictures, and metadata related to formatting and special rules regarding document generation). FrameMaker solution The data is then aggregated and converted into multiple formats for publication and distribution. Such formats 16 Next steps include Adobe Portable Document Format (PDF) and Hypertext Markup Language (HTML), including HTML5, for 18 Conclusion the Internet, ePub, and Kindle formats, help outputs for online help systems, Extensible Markup Language (XML), which can be delivered to VoiceXML browsers and mobile devices, and formats for native apps that can be viewed on mobile devices without an Internet connection. The goal for many organizations is to create content once and publish it across multiple formats. Through Adobe Technical Communication Suite 4, FrameMaker can also publish to multiscreen HTML5 for delivery on mobile devices such as tablet computers and smartphones. Database publishing occurs in two broad categories: automated, tagged publishing or data-driven, dynamic publishing.
    [Show full text]
  • Mariadb Performance Schema Empty
    Mariadb Performance Schema Empty Distractible and radiological Spike never dehorns seducingly when Alain stunt his haematomas. Virgil unwreathe her totalisators akimbo, she repudiating it primitively. Hastening Wilden anastomosed: he institute his Trotskyism homeward and unnaturally. Drops a performance schema is in the table aggregates events are not allowing the child statements 4 Optimizing Schema and Data Types High Performance. If your servers to following script will produce different types have mariadb performance schema empty file empty file is created and implementation does make sure how? But simple you facilitate to avoid installing all MariaDBMySQL or PostgreSQL files you. The Performance Schema includes a race of tables that give information on how. A clustered index you should create a sand heap reserved for performance on inserts. MySQL Performance Schema in 20 Minutes SlideShare. For by just referred to fill any questions no cipher used for root password on these entities in settings were blocking transaction events for mariadb performance schema empty string value. MariaDB create database DATABASENAME Create efficient new user only with their access this grant privileges to this user on youth new database. Could instead Create Connection To Database Server Mysql. By default the varlogmariadb directory is owned by mysqlmysql so simply. Improved SQL Document Parser Performance in Updated dbForge Tools for. Mysql select from sysprocesslist where pid is not NULLG. In accessing it to increase operational agility, primary key is mariadb performance schema empty? I connect to learn yourself the performanceschema and the INFORMATIONSCHEMAINNODBMETRICS from smart book called MySQL57. This site for it to modify the delta is not send a given language but, tables which is highly discouraged, adjust zoom based entry for performance schema collects a significant amounts of.
    [Show full text]
  • Implementing Database Publishing in Rhythmyx
    Rhythmyx Implementing Database Publishing Version 5.7 Printed on 17 October, 2005 Copyright and Licensing Statement All intellectual property rights in the SOFTWARE and associated user documentation, implementation documentation, and reference documentation are owned by Percussion Software or its suppliers and are protected by United States and Canadian copyright laws, other applicable copyright laws, and international treaty provisions. Percussion Software retains all rights, title, and interest not expressly grated. You may either (a) make one (1) copy of the SOFTWARE solely for backup or archival purposes or (b) transfer the SOFTWARE to a single hard disk provided you keep the original solely for backup or archival purposes. You must reproduce and include the copyright notice on any copy made. You may not copy the user documentation accompanying the SOFTWARE. The information in Rhythmyx documentation is subject to change without notice and does not represent a commitment on the part of Percussion Software, Inc. This document describes proprietary trade secrets of Percussion Software, Inc. Licensees of this document must acknowledge the proprietary claims of Percussion Software, Inc., in advance of receiving this document or any software to which it refers, and must agree to hold the trade secrets in confidence for the sole use of Percussion Software, Inc. Copyright © 1999-2005 Percussion Software. All rights reserved Licenses and Source Code Rhythmyx uses Mozilla's JavaScript C API. See http://www.mozilla.org/source.html (http://www.mozilla.org/source.html) for the source code. In addition, see the Mozilla Public License (http://www.mozilla.org/source.html). Netscape Public License Apache Software License IBM Public License Lesser GNU Public License Other Copyrights The Rhythmyx installation application was developed using InstallShield, which is a licensed and copyrighted by InstallShield Software Corporation.
    [Show full text]
  • Migrating Data-Centric Applications to Windows Azure
    Migrating Data-Centric Applications to Windows Azure Kun Cheng, Selcin Turkarslan, Norberto Garcia, Steve Howard, Shaun Tinline-Jones, Sreedhar Pelluru, Silvano Coriani, Jaime Alva Bravo Contributors: James Podgorski, Rama Ramani Reviewers: Paolo Salvatori, Stuart Ozer, Drew McDaniel, Jason Chen, Ganesh Srinivasan, Lindsey Allen, Evgeny Krivosheev, Valery Mizonov, Avilay Parekh, Christian Martinez, Shawn Hernan, Mark Simms, Adrian Bethune, Bill Gibson, Adam Mahood Summary: The guide, Migrating Data-Centric Applications to Windows Azure, provides experienced developers and information technology (IT) professionals with detailed guidance on how to migrate their data-centric applications to Windows Azure Cloud Services, while also providing an introduction on how to migrate those same applications to Windows Azure Virtual Machines. By using this guide, you will have the planning process, migration considerations, and prescriptive how to’s needed for a positive migration experience. Capturing the best practices from the real-world engagements of CAT and the technical expertise of the SQL Database Content team, Migrating Data-Centric Applications to Windows Azure can help you simplify the migration process, provide guidance on the most appropriate migration tools, and drive a successful implementation of your migration plan. Category: Guide Applies to: Windows Azure Source: MSDN Library (link to source content) E-book publication date: June 2012 Copyright © 2012 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies.
    [Show full text]