Encrypted Shared Data Spaces

被引:0
|
作者
Russello, Giovanni [1 ]
Dong, Changyu [1 ]
Dulay, Naranker [1 ]
Chaudron, Michel [2 ]
van Steen, Maarten [3 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
[3] Vrije Univ Amsterdam, Amsterdam, Netherlands
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples; without having to know other agents' keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [41] Querying Encrypted OLAP Data
    Cuzzocrea, Alfredo
    Grasso, Giorgio Mario
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 161 - 163
  • [42] Compression of encrypted visual data
    Gschwandtner, Michael
    Uhl, Andreas
    Wild, Peter
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 141 - 150
  • [43] How to Compress Encrypted Data
    Fleischhacker, Nils
    Larsen, Kasper Green
    Simkin, Mark
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 551 - 577
  • [44] Search Over Encrypted Data
    Vaidya, Siddhesh Ashok
    Bhosale, Varsha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 287 - 292
  • [45] Contingency access to encrypted data
    McLees, Todd
    Software World, 2006, 37 (03): : 11 - 12
  • [46] Quantile estimation for encrypted data
    Park, Minje
    Kim, Jaeseon
    Shin, Sungchul
    Park, Cheolwoo
    Jeon, Jong-June
    Kwon, SoonSun
    Choi, Hosik
    APPLIED INTELLIGENCE, 2023, 53 (21) : 24782 - 24791
  • [47] Quantum computing on encrypted data
    K. A. G. Fisher
    A. Broadbent
    L. K. Shalm
    Z. Yan
    J. Lavoie
    R. Prevedel
    T. Jennewein
    K. J. Resch
    Nature Communications, 5
  • [48] Hindering data theft with encrypted data trees
    Blasco, Jorge
    Tapiador, Juan E.
    Pens-Lopez, Pedro
    Suarez-Tangil, Guillermo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 101 : 147 - 158
  • [49] Shared spaces: a future for JCOM
    Weitkamp, Emma
    JCOM-JOURNAL OF SCIENCE COMMUNICATION, 2014, 13 (02):
  • [50] Searchable Encrypted String for Query Support on Different Encrypted Data Types
    Azizi, Shahrzad
    Mohammadpur, Davud
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (10): : 4198 - 4213