Bucketization techniques allow for effective organization of encrypted data at untrusted servers and for querying by clients. This paper presents a new metric for estimating the risk of data exposure over a set of bucketized data. The metric accounts for the importance of bucket distinctness relative to bucket access. Additionally, we review a method of controlled diffusion which improves bucket security by maximizing entropy and variance. In conjunction with our metric we use this method to show that the advantages of bucketization may be offset due to a loss of bucket security. © 2013 Springer Science+Business Media Dordrecht(Outside the USA).
CITATION STYLE
Raybourn, T., Lee, J. K., & Kresman, R. (2013). On privacy preserving encrypted data stores. In Lecture Notes in Electrical Engineering (Vol. 240 LNEE, pp. 219–226). https://doi.org/10.1007/978-94-007-6738-6_28
Mendeley helps you to discover research relevant for your work.