A Privacy-Aware and User-Centric Approach for Query Processing in Cloud

被引:1
|
作者
Samanthula, Bharath K. [1 ]
Liporace, James [1 ]
Issiov, Martin [1 ]
机构
[1] Montclair State Univ, Dept Comp Sci, 1 Normal Ave, Montclair, NJ 07043 USA
关键词
Cloud Computing; Encryption; Secure Comparison; Range Query;
D O I
10.1109/SmartCloud.2018.00017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pertinent advantages of cloud computing, such as on-demand scalability and pay-per-usage model, are pushing organizations for outsourcing their databases and computations to untrusted servers. Due to the growing privacy concerns and government regulations, data is often encrypted before being outsourced to a third-party cloud. However, this places various constraints on the basic functionalities that can be offered by the cloud. Specifically, query processing over encrypted databases in cloud has gained significant attention in database-as-a-service models. One of the fundamental problems in the context of query processing over encrypted data is to securely compare encrypted integers. Along this direction, we first propose a novel privacy-aware protocol for securely comparing two encrypted integers. Next, to demonstrate the applicability of our privacy-aware protocol, we show how it can be used as a building block to solve the problem of range queries over encrypted data in the cloud. Our preliminary investigation indicates that our proposed protocols incur negligible computation cost on the end-user and also ensure the confidentiality of the data, thus giving more control to the users over their privacy.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [1] Query Disambiguation: User-centric Approach
    Feki, Ghada
    Fakhfakh, Rim
    Ben Ammar, Anis
    Ben Amar, Chokri
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (03): : 144 - 156
  • [2] Cloud Computing Privacy Issues and User-Centric Solution
    Lijo, V. P.
    Kalady, Saidalavi
    COMPUTER NETWORKS AND INTELLIGENT COMPUTING, 2011, 157 : 448 - 456
  • [3] Protecting Privacy in Trajectories with a User-Centric Approach
    Romero-Tris, Cristina
    Megias, David
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2018, 12 (06)
  • [4] A Privacy-aware Query Authentication Index for Encrypted Database in Cloud
    Jang, Miyoung
    Jo, Ara
    Chang, Jae-Woo
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 126 - 131
  • [5] Designing Privacy for You: A Practical Approach for User-Centric Privacy
    Senarath, Awanthika
    Arachchilage, Nalin A. G.
    Slay, Jill
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 739 - 752
  • [6] A User-Centric Method for Data Privacy Protection in Cloud Computing
    Li, Xiaohui
    He, Jingsha
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 355 - +
  • [7] Assessing Privacy Risks in Android: A User-Centric Approach
    Mylonas, Alexios
    Theoharidou, Marianthi
    Gritzalis, Dimitris
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 21 - 37
  • [8] BOUNCER: Privacy-Aware Query Processing over Federations of RDF Datasets
    Endris, Kemele M.
    Almhithawi, Zuhair
    Lytra, Ioanna
    Vidal, Maria-Esther
    Auer, Soeren
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2018, PT I, 2018, 11029 : 69 - 84
  • [9] Privacy-aware query processing in vehicular ad-hoc networks
    Lai, Yongxuan
    Xu, Yifan
    Yang, Fan
    Lu, Wei
    Yu, Quan
    AD HOC NETWORKS, 2019, 91
  • [10] Approach for Cloud Recommendation and Integration to Construct User-Centric Hybrid Cloud
    Park, Joonseok
    Yun, Donggyu
    Kim, Ungsoo
    Yeom, Keunhyuk
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 24 - 32