Skip to main content
Top

2013 | OriginalPaper | Chapter

On Privacy Preserving Encrypted Data Stores

Authors : Tracey Raybourn, Jong Kwan Lee, Ray Kresman

Published in: Multimedia and Ubiquitous Engineering

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Bucketization techniques allow for effective organization of encrypted data at untrusted servers and for querying by clients. This paper presents a new metric for estimating the risk of data exposure over a set of bucketized data. The metric accounts for the importance of bucket distinctness relative to bucket access. Additionally, we review a method of controlled diffusion which improves bucket security by maximizing entropy and variance. In conjunction with our metric we use this method to show that the advantages of bucketization may be offset due to a loss of bucket security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: 2004 ACM SIGMOD international conference on management of data, Paris, pp 563–574 Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: 2004 ACM SIGMOD international conference on management of data, Paris, pp 563–574
2.
go back to reference Alwarsh M, Kresman R (2011) On querying encrypted databases. In: 2011 international conference on security and management, Las Vegas, pp 256–262 Alwarsh M, Kresman R (2011) On querying encrypted databases. In: 2011 international conference on security and management, Las Vegas, pp 256–262
3.
go back to reference Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM conference on computer and communication security, Washington, DC, pp 93–102 Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM conference on computer and communication security, Washington, DC, pp 93–102
4.
go back to reference Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: 30th international conference on very large databases, Toronto, pp 720–731 Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: 30th international conference on very large databases, Toronto, pp 720–731
5.
go back to reference Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358CrossRef Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358CrossRef
6.
go back to reference Huet B, Chua TS, Hauptmann A (2012) Large-scale multimedia data collections. IEEE MultiMedia 19(3):12–14 (IEEE Computer Society) Huet B, Chua TS, Hauptmann A (2012) Large-scale multimedia data collections. IEEE MultiMedia 19(3):12–14 (IEEE Computer Society)
7.
go back to reference Li J, Omiecinski ER (2005) Efficiency and security trade-off in supporting range queries on encrypted databases. In: 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, pp 69–83 Li J, Omiecinski ER (2005) Efficiency and security trade-off in supporting range queries on encrypted databases. In: 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, pp 69–83
8.
go back to reference Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing, Honolulu, pp 502–509 Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing, Honolulu, pp 502–509
10.
go back to reference Smith JR, Döller M, Tous R, Gruhne M, Yoon K, Sano M, Burnett IS (2008) The MPEG query format: unifying access to multimedia retrieval systems. IEEE Multimedia 15(4):82–95CrossRef Smith JR, Döller M, Tous R, Gruhne M, Yoon K, Sano M, Burnett IS (2008) The MPEG query format: unifying access to multimedia retrieval systems. IEEE Multimedia 15(4):82–95CrossRef
11.
go back to reference Sun W, Rane S (2012) A distance-sensitive attribute based cryptosystem for privacy-preserving querying. In: 2012 IEEE international conference on multimedia and expo, Melbourne, pp. 386–391 Sun W, Rane S (2012) A distance-sensitive attribute based cryptosystem for privacy-preserving querying. In: 2012 IEEE international conference on multimedia and expo, Melbourne, pp. 386–391
12.
go back to reference Wang J, Du X, Lu J, Lu W (2010) Bucket-based authentication for outsourced databases. Concurr Comput Pract Experience 22(9):1160–1180 Wang J, Du X, Lu J, Lu W (2010) Bucket-based authentication for outsourced databases. Concurr Comput Pract Experience 22(9):1160–1180
13.
go back to reference Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Privacy 9:49–55CrossRef Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Privacy 9:49–55CrossRef
14.
go back to reference Win LL, Thomas T, Emmanuel S (2011) A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE international conference on multimedia and expo, pp 1–6, Barcelona Win LL, Thomas T, Emmanuel S (2011) A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE international conference on multimedia and expo, pp 1–6, Barcelona
15.
go back to reference Yao Y, Guo H, Sun C (2008) An improved indexing scheme for range queries. In: 2008 international conference on security and management, Las Vegas, pp 397–403 Yao Y, Guo H, Sun C (2008) An improved indexing scheme for range queries. In: 2008 international conference on security and management, Las Vegas, pp 397–403
Metadata
Title
On Privacy Preserving Encrypted Data Stores
Authors
Tracey Raybourn
Jong Kwan Lee
Ray Kresman
Copyright Year
2013
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6738-6_28