An experimental evaluation of multi-key strategies for data outsourcing

29Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsourced data from unauthorized accesses, even from the (honest but curious) host server, data are encrypted and indexes associated with them enable the server to execute queries without the need of accessing cleartext. Current solutions consider the whole database as encrypted with a single key known only to the data owner, which therefore has to be kept involved in the query execution process. In this paper, we propose different multi-key data encryption strategies for enforcing access privileges. Our strategies exploit different keys, which are distributed to the users, corresponding to the different authorizations. We then present some experiments evaluating the quality of the proposed strategies with respect to the amount of cryptographic information to be produced and maintained. © 2007 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Damiani, E., De Captani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., & Samarati, P. (2007). An experimental evaluation of multi-key strategies for data outsourcing. In IFIP International Federation for Information Processing (Vol. 232, pp. 385–396). https://doi.org/10.1007/978-0-387-72367-9_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free