Cryptographic Techniques for Data Processing

Shantanu Sharma, Sharad Mehrotra

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

This tutorial focuses on two principal lines of research aimed to provide secure data processing cloud-based data outsourcing - encryption and secret-sharing-based approaches that have been developed over the last two decades. The tutorial compares these techniques based on efficiency and information leakage. We discuss that existing cryptographic techniques are not sufficient alone to achieve the goal of efficient as well as secure data processing. To overcome the limitation of efficient and secure data processing, a new line of work that combines software and hardware mechanisms is required. We discuss an orthogonal approach designed around the concept of data partitioning, i.e., splitting the data processing into cryptographically secure and non-secure parts. Finally, we will discuss some open questions in designing secure cryptographic techniques that can process large-sized data efficiently.

Original languageEnglish (US)
Title of host publicationCODS-COMAD 2022 - Proceedings of the 5th Joint International Conference on Data Science and Management of Data (9th ACM IKDD CODS and 27th COMAD)
PublisherAssociation for Computing Machinery
Pages344-347
Number of pages4
ISBN (Electronic)9781450385824
DOIs
StatePublished - Jan 8 2022
Event5th ACM India Joint 9th ACM IKDD Conference on Data Science and 27th International Conference on Management of Data, CODS-COMAD 2022 - Virtual, Online, India
Duration: Jan 7 2022Jan 10 2022

Publication series

NameACM International Conference Proceeding Series

Conference

Conference5th ACM India Joint 9th ACM IKDD Conference on Data Science and 27th International Conference on Management of Data, CODS-COMAD 2022
Country/TerritoryIndia
CityVirtual, Online
Period1/7/221/10/22

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Cryptographic Techniques for Data Processing'. Together they form a unique fingerprint.

Cite this