Skip to main content

2013 | OriginalPaper | Buchkapitel

On Privacy Preserving Encrypted Data Stores

verfasst von : Tracey Raybourn, Jong Kwan Lee, Ray Kresman

Erschienen in: Multimedia and Ubiquitous Engineering

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Bucketization techniques allow for effective organization of encrypted data at untrusted servers and for querying by clients. This paper presents a new metric for estimating the risk of data exposure over a set of bucketized data. The metric accounts for the importance of bucket distinctness relative to bucket access. Additionally, we review a method of controlled diffusion which improves bucket security by maximizing entropy and variance. In conjunction with our metric we use this method to show that the advantages of bucketization may be offset due to a loss of bucket security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: 2004 ACM SIGMOD international conference on management of data, Paris, pp 563–574 Agrawal R, Kiernan J, Srikant R, Xu Y (2004) Order preserving encryption for numeric data. In: 2004 ACM SIGMOD international conference on management of data, Paris, pp 563–574
2.
Zurück zum Zitat Alwarsh M, Kresman R (2011) On querying encrypted databases. In: 2011 international conference on security and management, Las Vegas, pp 256–262 Alwarsh M, Kresman R (2011) On querying encrypted databases. In: 2011 international conference on security and management, Las Vegas, pp 256–262
3.
Zurück zum Zitat Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM conference on computer and communication security, Washington, DC, pp 93–102 Damiani E, De Capitani di Vimercati S, Jajodia S, Paraboschi S, Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational DBMSs. In: 10th ACM conference on computer and communication security, Washington, DC, pp 93–102
4.
Zurück zum Zitat Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: 30th international conference on very large databases, Toronto, pp 720–731 Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: 30th international conference on very large databases, Toronto, pp 720–731
5.
Zurück zum Zitat Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358CrossRef Hore B, Mehrotra S, Canim M, Kantarcioglu M (2012) Secure multidimensional range queries over outsourced data. VLDB J 21(3):333–358CrossRef
6.
Zurück zum Zitat Huet B, Chua TS, Hauptmann A (2012) Large-scale multimedia data collections. IEEE MultiMedia 19(3):12–14 (IEEE Computer Society) Huet B, Chua TS, Hauptmann A (2012) Large-scale multimedia data collections. IEEE MultiMedia 19(3):12–14 (IEEE Computer Society)
7.
Zurück zum Zitat Li J, Omiecinski ER (2005) Efficiency and security trade-off in supporting range queries on encrypted databases. In: 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, pp 69–83 Li J, Omiecinski ER (2005) Efficiency and security trade-off in supporting range queries on encrypted databases. In: 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, pp 69–83
8.
Zurück zum Zitat Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing, Honolulu, pp 502–509 Liu D, Wang S (2012) Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th international conference on cloud computing, Honolulu, pp 502–509
10.
Zurück zum Zitat Smith JR, Döller M, Tous R, Gruhne M, Yoon K, Sano M, Burnett IS (2008) The MPEG query format: unifying access to multimedia retrieval systems. IEEE Multimedia 15(4):82–95CrossRef Smith JR, Döller M, Tous R, Gruhne M, Yoon K, Sano M, Burnett IS (2008) The MPEG query format: unifying access to multimedia retrieval systems. IEEE Multimedia 15(4):82–95CrossRef
11.
Zurück zum Zitat Sun W, Rane S (2012) A distance-sensitive attribute based cryptosystem for privacy-preserving querying. In: 2012 IEEE international conference on multimedia and expo, Melbourne, pp. 386–391 Sun W, Rane S (2012) A distance-sensitive attribute based cryptosystem for privacy-preserving querying. In: 2012 IEEE international conference on multimedia and expo, Melbourne, pp. 386–391
12.
Zurück zum Zitat Wang J, Du X, Lu J, Lu W (2010) Bucket-based authentication for outsourced databases. Concurr Comput Pract Experience 22(9):1160–1180 Wang J, Du X, Lu J, Lu W (2010) Bucket-based authentication for outsourced databases. Concurr Comput Pract Experience 22(9):1160–1180
13.
Zurück zum Zitat Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Privacy 9:49–55CrossRef Weis J, Alves-Foss J (2011) Securing database as a service: issues and compromises. IEEE Secur Privacy 9:49–55CrossRef
14.
Zurück zum Zitat Win LL, Thomas T, Emmanuel S (2011) A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE international conference on multimedia and expo, pp 1–6, Barcelona Win LL, Thomas T, Emmanuel S (2011) A privacy preserving content distribution mechanism for DRM without trusted third parties. In: 2011 IEEE international conference on multimedia and expo, pp 1–6, Barcelona
15.
Zurück zum Zitat Yao Y, Guo H, Sun C (2008) An improved indexing scheme for range queries. In: 2008 international conference on security and management, Las Vegas, pp 397–403 Yao Y, Guo H, Sun C (2008) An improved indexing scheme for range queries. In: 2008 international conference on security and management, Las Vegas, pp 397–403
Metadaten
Titel
On Privacy Preserving Encrypted Data Stores
verfasst von
Tracey Raybourn
Jong Kwan Lee
Ray Kresman
Copyright-Jahr
2013
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6738-6_28

Neuer Inhalt