Scaling cryptographic techniques by exploiting data sensitivity at a public cloud

Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This poster continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. In particular, this poster outlines a new secure keyword search approach, called query keyword binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB improves the performance of and strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.

Original languageEnglish (US)
Title of host publicationCODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages165-167
Number of pages3
ISBN (Electronic)9781450360999
DOIs
StatePublished - Mar 13 2019
Externally publishedYes
Event9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019 - Richardson, United States
Duration: Mar 25 2019Mar 27 2019

Publication series

NameCODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy

Conference

Conference9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019
Country/TerritoryUnited States
CityRichardson
Period3/25/193/27/19

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications
  • Software

Keywords

  • Cryptographic techniques
  • Scalability

Fingerprint

Dive into the research topics of 'Scaling cryptographic techniques by exploiting data sensitivity at a public cloud'. Together they form a unique fingerprint.

Cite this