TY - GEN
T1 - Scaling cryptographic techniques by exploiting data sensitivity at a public cloud
AU - Mehrotra, Sharad
AU - Sharma, Shantanu
AU - Ullman, Jeffrey D.
N1 - Publisher Copyright:
© 2019 Copyright held by the owner/author(s).
PY - 2019/3/13
Y1 - 2019/3/13
N2 - Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This poster continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. In particular, this poster outlines a new secure keyword search approach, called query keyword binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB improves the performance of and strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.
AB - Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This poster continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. In particular, this poster outlines a new secure keyword search approach, called query keyword binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB improves the performance of and strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.
KW - Cryptographic techniques
KW - Scalability
UR - http://www.scopus.com/inward/record.url?scp=85063860311&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85063860311&partnerID=8YFLogxK
U2 - 10.1145/3292006.3302384
DO - 10.1145/3292006.3302384
M3 - Conference contribution
AN - SCOPUS:85063860311
T3 - CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
SP - 165
EP - 167
BT - CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
PB - Association for Computing Machinery, Inc
T2 - 9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019
Y2 - 25 March 2019 through 27 March 2019
ER -