Scaling cryptographic techniques by exploiting data sensitivity at a public cloud

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This poster continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. In particular, this poster outlines a new secure keyword search approach, called query keyword binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB improves the performance of and strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.

Author supplied keywords

Cite

CITATION STYLE

APA

Mehrotra, S., Sharma, S., & Ullman, J. D. (2019). Scaling cryptographic techniques by exploiting data sensitivity at a public cloud. In CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (pp. 165–167). Association for Computing Machinery, Inc. https://doi.org/10.1145/3292006.3302384

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free