Encrypted Shared Data Spaces

被引:0
|
作者
Russello, Giovanni [1 ]
Dong, Changyu [1 ]
Dulay, Naranker [1 ]
Chaudron, Michel [2 ]
van Steen, Maarten [3 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[3] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples; without having to know other agents' keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [31] Efficient search on encrypted data
    Joseph, LTA
    Samsudin, A
    Belaton, B
    2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 352 - 357
  • [32] Identification with encrypted biometric data
    Bringer, Julien
    Chabanne, Herve
    Kindarji, Bruno
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (05) : 548 - 562
  • [33] Quantum Walks with Encrypted Data
    Rohde, Peter P.
    Fitzsimons, Joseph F.
    Gilchrist, Alexei
    PHYSICAL REVIEW LETTERS, 2012, 109 (15)
  • [34] Arithmetic operations on encrypted data
    Chang, CC
    Tsu, SM
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1995, 56 (1-2) : 1 - 10
  • [35] Efficient Clustering on Encrypted Data
    Zhang, Mengyu
    Wang, Long
    Zhang, Xiaoping
    Liu, Zhuotao
    Wang, Yisong
    Bao, Han
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 213 - 236
  • [36] Efficient sharing of encrypted data
    Bennett, K
    Grothoff, C
    Horozov, T
    Patrascu, I
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 107 - 120
  • [37] Quantum computing on encrypted data
    Fisher, K. A. G.
    Broadbent, A.
    Shalm, L. K.
    Yan, Z.
    Lavoie, J.
    Prevedel, R.
    Jennewein, T.
    Resch, K. J.
    NATURE COMMUNICATIONS, 2014, 5
  • [38] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 57 - +
  • [39] Efficient Analytics on Encrypted Data
    Gershinsky, Gidon
    SYSTOR'18: PROCEEDINGS OF THE 11TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2018, : 121 - 121
  • [40] Quantile estimation for encrypted data
    Minje Park
    Jaeseon Kim
    Sungchul Shin
    Cheolwoo Park
    Jong-June Jeon
    SoonSun Kwon
    Hosik Choi
    Applied Intelligence, 2023, 53 : 24782 - 24791