Encrypted Shared Data Spaces

被引:0
|
作者
Russello, Giovanni [1 ]
Dong, Changyu [1 ]
Dulay, Naranker [1 ]
Chaudron, Michel [2 ]
van Steen, Maarten [3 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[3] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples; without having to know other agents' keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [11] Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property
    Joo, Minkyu
    Lee, Pil Joong
    INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 231 - 243
  • [12] Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation
    James, Maria
    Srinivasan, Chungath
    Lakshmy, K. V.
    Sethumadhavan, M.
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 385 - 392
  • [13] Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression
    Li, Fengyong
    Zhang, Lianming
    Wei, Weimin
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [14] Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression
    Fengyong Li
    Lianming Zhang
    Weimin Wei
    EURASIP Journal on Image and Video Processing, 2020
  • [15] Shared spaces
    Bradley, L
    Walker, G
    McGrath, A
    BRITISH TELECOMMUNICATIONS ENGINEERING, 1996, 15 : 162 - 167
  • [16] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1259 - 1261
  • [17] SUPERIMPOSING ENCRYPTED DATA
    YU, KW
    YU, TL
    COMMUNICATIONS OF THE ACM, 1991, 34 (02) : 48 - 54
  • [18] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1262 - 1263
  • [19] Computing on Encrypted Data
    Smart, Nigel
    IEEE SECURITY & PRIVACY, 2023, 21 (04) : 94 - 98
  • [20] Computing on Encrypted Data
    Gentry, Craig
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 477 - 477