DocumentCode :
244081
Title :
Encrypted Set Intersection Protocol for Outsourced Datasets
Author :
Fang Liu ; Wee Keong Ng ; Wei Zhang ; Do Hoang Giang ; Shuguo Han
Author_Institution :
Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, Singapore
fYear :
2014
fDate :
11-14 March 2014
Firstpage :
135
Lastpage :
140
Abstract :
Secure and efficient data storage and computation for an outsourced database is a primary concern for users, especially with the push for cloud computing that affords both compute and resource scalability. Among the diverse secure building blocks for secure analytical computations on outsourced databases, the encrypted set intersection operation extracts common sensitive information from datasets belonging to different users. In existing methods, each user holds their sensitive data and all users follow a secure protocol to perform set intersection. This approach is not applicable to the cloud platform, where data resides in the cloud platform in encrypted form and not at each user site. To address this limitation, in this paper, we design the Encrypted Set Intersection Protocol (ESIP) that allows server and users to perform collaborative operations to obtain the correct set intersection result without violating privacy of data contributed by each user at the server.
Keywords :
cloud computing; cryptographic protocols; data privacy; ESIP; cloud computing; data computation; data privacy; data storage; encrypted set intersection protocol; outsourced datasets; resource scalability; secure analytical computations; secure protocol; sensitive information; Collaboration; Complexity theory; Encryption; Protocols; Servers; cloud computing; data mining; outsourced dataset; protocol; set intersection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Engineering (IC2E), 2014 IEEE International Conference on
Conference_Location :
Boston, MA
Type :
conf
DOI :
10.1109/IC2E.2014.18
Filename :
6903466
Link To Document :
بازگشت