On privacy preserving encrypted data stores

2Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Bucketization techniques allow for effective organization of encrypted data at untrusted servers and for querying by clients. This paper presents a new metric for estimating the risk of data exposure over a set of bucketized data. The metric accounts for the importance of bucket distinctness relative to bucket access. Additionally, we review a method of controlled diffusion which improves bucket security by maximizing entropy and variance. In conjunction with our metric we use this method to show that the advantages of bucketization may be offset due to a loss of bucket security. © 2013 Springer Science+Business Media Dordrecht(Outside the USA).

Cite

CITATION STYLE

APA

Raybourn, T., Lee, J. K., & Kresman, R. (2013). On privacy preserving encrypted data stores. In Lecture Notes in Electrical Engineering (Vol. 240 LNEE, pp. 219–226). https://doi.org/10.1007/978-94-007-6738-6_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free