Replication | Transaction | Access control | Confidentiality | Allows operations and searches over encrypted data | |
---|---|---|---|---|---|
TSpaces [35] | \(\mathcal {X}\) | √ | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) |
JavaSpaces [36] | \(\mathcal {X}\) | √ | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) |
GigaSpaces [37] | \(\mathcal {X}\) | √ | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) |
FT-Linda [12] | √ | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) |
Parallel-Linda [38] | √ | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) | \(\mathcal {X}\) |
SecSpaces [10] | \(\mathcal {X}\) | \(\mathcal {X}\) | √ | \(\mathcal {X}\) | \(\mathcal {X}\) |
KLAIM [9] | \(\mathcal {X}\) | \(\mathcal {X}\) | √ | \(\mathcal {X}\) | \(\mathcal {X}\) |
SECOS [11] | \(\mathcal {X}\) | \(\mathcal {X}\) | √ | \(\mathcal {X}\) | \(\mathcal {X}\) |
DepSpace [5] | √ | \(\mathcal {X}\) | √ | √ | \(\mathcal {X}\) |
DepSpace+this paper solutions | √ | \(\mathcal {X}\) | √ | √ | √ |