Licensed Processing of Encrypted Information

被引:0
|
作者
Rass, Stefan [1 ]
Schartner, Peter [1 ]
机构
[1] Univ Klagenfurt, Dept Appl Informat, Univ Str 65-67, A-9020 Klagenfurt, Austria
关键词
private function evaluation; cloud computing; licensing; security; cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We report on work in progress concerning a computational model for data processing in privacy. As a core design goal here, we will focus on how the data owner can authorize another party to process data on his behalf. In that scenario, the algorithm or software for the processing can even be provided by a third party. The goal is here to protect the intellectual property rights of all relevant players, while retaining an efficient system that allows data processing in distrusted environments, such as clouds.
引用
收藏
页码:703 / 704
页数:2
相关论文
共 50 条
  • [21] Private Boolean Query Processing on Encrypted Data
    Do, Hoang Giang
    Ng, Wee Keong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 321 - 332
  • [22] Towards Encrypted Query Processing for the Internet of Things
    Shafagh, Hossein
    Hithnawi, Anwar
    Droscher, Andreas
    Duquennoy, Simon
    Hu, Wen
    [J]. MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2015, : 251 - 253
  • [23] Processing Analytical Queries over Encrypted Data
    Tu, Stephen
    Kaashoek, M. Frans
    Madden, Samuel
    Zeldovich, Nickolai
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (05): : 289 - 300
  • [24] CryptDB: Protecting Confidentiality with Encrypted Query Processing
    Popa, Raluca Ada
    Redfield, Catherine M. S.
    Zeldovich, Nickolai
    Balakrishnan, Hari
    [J]. SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2011, : 85 - 100
  • [25] ENKI: Access Control for Encrypted Query Processing
    Hang, Isabelle
    Kerschbaum, Florian
    Damiani, Ernesto
    [J]. SIGMOD'15: PROCEEDINGS OF THE 2015 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2015, : 183 - 196
  • [26] Secure Access Delegation of Encrypted Medical Information
    Gupta, Arnab Deb
    Polyakov, Yuriy
    Rohloff, Kurt
    [J]. 2016 10TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2016,
  • [27] Organization implementation guidelines for recovery of encrypted information
    Maclean, A
    Matyas, SM
    Zunic, N
    [J]. COMPUTERS & SECURITY, 2000, 19 (01) : 69 - 81
  • [28] Securing encrypted image information in audio data
    Shamsi, Zeba
    Laiphrakpam, Dolendro Singh
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (21) : 33063 - 33085
  • [29] Authentication of Encrypted Secret Information in Image Steganography
    Kalaivani, B.
    Padmaa, M.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [30] Adaptive encrypted information hiding scheme for images
    Zhao, Bin
    Fan, Kai
    Wang, Yue
    Kou, Weidong
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 950 - +