Searchable Encryption for Outsourced Data Analytics

被引:0
|
作者
Kerschbaum, Florian [1 ]
Sorniotti, Alessandro [2 ]
机构
[1] SAP Res, Karlsruhe, Germany
[2] SAP Res & Inst Eurecom, Sophia Antipolis, France
关键词
IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; QUERIES;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two sets of privacy requirements need to be fulfilled when a company's accounting data is audited by an external party: the company needs to safeguard its data, while the auditors do not want to reveal their investigation methods. This problem is usually addressed by physically isolating data and auditors during the course of an audit. This approach however no longer works when auditing is performed remotely. In this paper we present an efficient construction for a searchable encryption scheme for outsourcing data analytics. In this scheme the data owner needs to encrypt his data only once and ship it in encrypted form to the data analyst. The data analyst can then perform a series of queries for which he must ask the data owner for help in translating the constants in the queries. Our searchable encryption scheme extends previous work by the ability to re-use query results as search tokens (query-result reusability) and the ability to perform range queries. It is efficient with O(log(2) n) work for a range query and is semantically secure relying only on Diffie-Hellman assumptions (in the random oracle model).
引用
下载
收藏
页码:61 / +
页数:4
相关论文
共 50 条
  • [21] Partitioned Searchable Encryption
    Barthel, Jim
    Beunardeau, Marc
    Rosie, Razvan
    Sahu, Rajeev Anand
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 63 - 79
  • [22] Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage
    Shahien, Toka
    Sarhan, Amany M.
    Alshewimy, Mahmoud A. M.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8663 - 8681
  • [23] Searchable encryption : A survey
    Sharma, Dhruti
    INFORMATION SECURITY JOURNAL, 2023, 32 (02): : 76 - 119
  • [24] Searchable Encryption Schemes
    Premasathian, Nol
    Choto, Somsak
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 147 - 150
  • [25] Decryptable searchable encryption
    Fuhr, Thomas
    Paillier, Pascal
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 228 - 236
  • [26] Survey on the searchable encryption
    Jia, Chun-Fu
    Liu, Zhe-Li
    Li, Jin
    Li, Min
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (01): : 109 - 128
  • [27] Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage
    Toka Shahien
    Amany M. Sarhan
    Mahmoud A. M. Alshewimy
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 8663 - 8681
  • [28] Searchable encryption algorithm in computer big data processing application
    Ming, Lu
    AUTOMATIKA, 2023, 64 (04) : 1204 - 1214
  • [29] Dynamic searchable symmetric encryption for storing geospatial data in the cloud
    Hiemenz, Benedikt
    Kraemer, Michel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (03) : 333 - 354
  • [30] Searchable Encryption with Pattern Matching for Securing Data on Cloud Server
    Pramanick, Neha
    Ali, Syed Taqi
    2017 8TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2017,