Movatterモバイル変換


[0]ホーム

URL:


loading
PapersPapers/2022PapersPapers/2022

Scitepress Logo

The Search is performed on all of the following fields:

Note: Please use complete words only.
  • Publication Title
  • Abstract
  • Publication Keywords
  • DOI
  • Proceeding Title
  • Proceeding Foreword
  • ISBN (Completed)
  • Insticc Ontology
  • Author Affiliation
  • Author Name
  • Editor Name
If you already have a Primoris Account you can use the same username/password here.
Research.Publish.Connect.

The Search is performed on all of the following fields:

Note: Please use complete words only.
  • Publication Title
  • Abstract
  • Publication Keywords
  • DOI
  • Proceeding Title
  • Proceeding Foreword
  • ISBN (Completed)
  • Insticc Ontology
  • Author Affiliation
  • Author Name
  • Editor Name
If you're looking for an exact phrase use quotation marks on text fields.

Paper

Paper Unlock

Authors:Majid Nateghizad;Zekeriya Erkin andReginald L. Lagendijk

Affiliation:Cyber Security Group, Department of Intelligent Systems, Delft University of Technology and The Netherlands

Keyword(s):Searching in Encrypted Databases, Homomorphic Encryption, Statistical Query, Indexing, Privacy.

RelatedOntology Subjects/Areas/Topics:Applied Cryptography ;Cryptographic Techniques and Key Management ;Data and Application Security and Privacy ;Data Engineering ;Database Security and Privacy ;Databases and Data Security ;Information and Systems Security ;Privacy ;Security and Privacy for Big Data ;Security and Privacy in IT Outsourcing ;Security in Information Systems

Abstract:It is astonishing to see more and more services built on user-oriented data, providing numerous tools to improve ones daily life. Nowadays, data collected from numerous sources is being used to monitor daily activities, i.e., monitoring patients. These innovations allow for more cost-efficient and scalable solutions. Nevertheless, these types of services can pose a threat to the privacy of individuals due to the possibility of leaking highly privacy-sensitive data. Therefore, it is essential to design such systems in a privacy-preserving manner. Inspired by a real-life project in the health-care domain, we propose to secure the data using encryption, while enabling the involved parties to run queries directly on this encrypted data. A vital component of such a system is searching for specific data entries within a large dataset. In this work, we present two cryptographic protocols that complete such a query by creating an encrypted vector in a simulation secure way. These vectors consist of a 1 for intended database entry, whereas other items would be represented as a 0. By creating index tables before the execution of the queries, it has become possible to execute a search query with high performance. As we show in our analyses, it takes less than one second to find the matching encrypted data-entry within a database with 100K records. Our proposal is generic, can be applied to several application domains, and practically compared to similar works.(More)

It is astonishing to see more and more services built on user-oriented data, providing numerous tools to improve ones daily life. Nowadays, data collected from numerous sources is being used to monitor daily activities, i.e., monitoring patients. These innovations allow for more cost-efficient and scalable solutions. Nevertheless, these types of services can pose a threat to the privacy of individuals due to the possibility of leaking highly privacy-sensitive data. Therefore, it is essential to design such systems in a privacy-preserving manner. Inspired by a real-life project in the health-care domain, we propose to secure the data using encryption, while enabling the involved parties to run queries directly on this encrypted data. A vital component of such a system is searching for specific data entries within a large dataset. In this work, we present two cryptographic protocols that complete such a query by creating an encrypted vector in a simulation secure way. These vectors consist of a 1 for intended database entry, whereas other items would be represented as a 0. By creating index tables before the execution of the queries, it has become possible to execute a search query with high performance. As we show in our analyses, it takes less than one second to find the matching encrypted data-entry within a database with 100K records. Our proposal is generic, can be applied to several application domains, and practically compared to similar works.

Full Text

Download
Please type the code

CC BY-NC-ND 4.0

Sign In

Guests can use SciTePress Digital Library without having a SciTePress account. However, guests have limited access to downloading full text versions of papers and no access to special options.
Guests can use SciTePress Digital Library without having a SciTePress account. However, guests have limited access to downloading full text versions of papers and no access to special options.
Guest:Register as new SciTePress user now for free.

Sign In

Download limit per month - 500 recent papers or 4000 papers more than 2 years old.
SciTePress user: please login.

PDF ImageMy Papers

PopUp Banner

Unable to see papers previously downloaded, because you haven't logged in as SciTePress Member.

If you are already a member please login.
You are not signed in, therefore limits apply to your IP address 153.126.140.213

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total
Popup Banner

PDF ButtonFull Text

Download
Please type the code

Paper citation in several formats:
Nateghizad, M., Erkin, Z. and L. Lagendijk, R. (2018).Efficient Index-based Search Protocols for Encrypted Databases. InProceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT; ISBN 978-989-758-319-3; ISSN 2184-3236, SciTePress, pages 270-281. DOI: 10.5220/0006869804360447

@conference{secrypt18,
author={Majid Nateghizad and Zekeriya Erkin and Reginald {L. Lagendijk}},
title={Efficient Index-based Search Protocols for Encrypted Databases},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT},
year={2018},
pages={270-281},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006869804360447},
isbn={978-989-758-319-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - SECRYPT
TI - Efficient Index-based Search Protocols for Encrypted Databases
SN - 978-989-758-319-3
IS - 2184-3236
AU - Nateghizad, M.
AU - Erkin, Z.
AU - L. Lagendijk, R.
PY - 2018
SP - 270
EP - 281
DO - 10.5220/0006869804360447
PB - SciTePress

    - Science and Technology Publications, Lda.
    RESOURCES

    Proceedings

    Papers

    Authors

    Ontology

    CONTACTS

    Science and Technology Publications, Lda
    Avenida de S. Francisco Xavier, Lote 7 Cv. C,
    2900-616 Setúbal, Portugal.

    Phone: +351 265 520 185(National fixed network call)
    Fax: +351 265 520 186
    Email:info@scitepress.org

    EXTERNAL LINKS

    PRIMORIS

    INSTICC

    SCITEVENTS

    CROSSREF

    PROCEEDINGS SUBMITTED FOR INDEXATION BY:

    dblp

    Ei Compendex

    SCOPUS

    Semantic Scholar

    Google Scholar

    Microsoft Academic


    [8]
    ページ先頭

    ©2009-2025 Movatter.jp