Private and secure secret shared mapreduce (Extended Abstract)

Shlomi Dolev, Yin Li, Shantanu Sharma

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Abstract

Data outsourcing allows data owners to keep their data in public clouds, which do not ensure the privacy of data and computations. One fundamental and useful framework for processing data in a distributed fashion is Map Reduce. In this paper, we investigate and present techniques for executing Map Reduce computations in the public cloud while preserving privacy. Specifically, we propose a technique to outsource a database using Shamir secret-sharing scheme to public clouds, and then, provide privacy-preserving algorithms for performing search and fetch, equijoin, and range queries using Map Reduce. Consequently, in our proposed algorithms, the public cloud cannot learn the database or computations. All the proposed algorithms eliminate the role of the database owner, which only creates and distributes secret-shares once, and minimize the role of the user, which only needs to perform a simple operation for result reconstructing. We evaluate the efficiency by (i) the number of communication rounds (between a user and a cloud), (ii) the total amount of bit flow (between a user and a cloud), and (iii) the computational load at the user-side and the cloud-side.

Original languageEnglish (US)
Title of host publicationData and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings
EditorsSilvio Ranise, Vipin Swarup
PublisherSpringer Verlag
Pages151-160
Number of pages10
ISBN (Print)9783319414829
DOIs
StatePublished - 2016
Externally publishedYes
Event30th IFIP WG 11.3 Conference on Data and Applications Security, DBSec 2016 - Trento, Italy
Duration: Jul 18 2016Jul 20 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9766
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference30th IFIP WG 11.3 Conference on Data and Applications Security, DBSec 2016
Country/TerritoryItaly
CityTrento
Period7/18/167/20/16

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Private and secure secret shared mapreduce (Extended Abstract)'. Together they form a unique fingerprint.

Cite this