A Privacy-Aware and User-Centric Approach for Query Processing in Cloud

被引:1
|
作者
Samanthula, Bharath K. [1 ]
Liporace, James [1 ]
Issiov, Martin [1 ]
机构
[1] Montclair State Univ, Dept Comp Sci, 1 Normal Ave, Montclair, NJ 07043 USA
关键词
Cloud Computing; Encryption; Secure Comparison; Range Query;
D O I
10.1109/SmartCloud.2018.00017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The pertinent advantages of cloud computing, such as on-demand scalability and pay-per-usage model, are pushing organizations for outsourcing their databases and computations to untrusted servers. Due to the growing privacy concerns and government regulations, data is often encrypted before being outsourced to a third-party cloud. However, this places various constraints on the basic functionalities that can be offered by the cloud. Specifically, query processing over encrypted databases in cloud has gained significant attention in database-as-a-service models. One of the fundamental problems in the context of query processing over encrypted data is to securely compare encrypted integers. Along this direction, we first propose a novel privacy-aware protocol for securely comparing two encrypted integers. Next, to demonstrate the applicability of our privacy-aware protocol, we show how it can be used as a building block to solve the problem of range queries over encrypted data in the cloud. Our preliminary investigation indicates that our proposed protocols incur negligible computation cost on the end-user and also ensure the confidentiality of the data, thus giving more control to the users over their privacy.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 50 条
  • [21] SaveMe: User-centric Cloud System
    Song, Gyuwon
    Kim, Suhyun
    Seo, Dongmahn
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 158 - 159
  • [22] Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices
    Li, Yinglong
    Liu, Weiru
    Zhu, Yihua
    Chen, Hong
    Cheng, Hongbing
    Chen, Tieming
    Hu, Ping
    Huan, Ruohong
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2022, 30 (05) : 1421 - 1435
  • [23] Designing Privacy-Aware Systems in the Cloud
    Kalloniatis, Christos
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 113 - 123
  • [24] Personal Cloudlets: Implementing a User-Centric Datastore with Privacy Aware Access Control for Cloud-based Data Platforms
    McCarthy, Donal
    Malone, Paul
    Hange, Johannes
    Doyle, Kenny
    Robson, Eric
    Conway, Dylan
    Ivanov, Stepan
    Radziwonowicz, Lukasz
    Kleinfeld, Robert
    Michalareas, Theodoros
    Kastrinogiannis, Timotheos
    Stasinos, Nikos
    Lampathaki, Fenareti
    2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON TECHNICAL AND LEGAL ASPECTS OF DATA PRIVACY AND SECURITY TELERISE 2015, 2015, : 38 - 43
  • [25] Protecting trajectory privacy: A user-centric analysis
    Shen, Hang
    Bai, Guangwei
    Yang, Mei
    Wang, Zhonghui
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 128 - 139
  • [26] User-Centric Privacy Engineering for the Internet of Things
    Barhamgi, Mahmoud
    Perera, Charith
    Ghedira, Chirine
    Benslimane, Djamal
    IEEE CLOUD COMPUTING, 2018, 5 (05): : 47 - 57
  • [27] User-centric privacy framework for pervasive environments
    Bagues, Susana Alcalde
    Zeidler, Andreas
    Valdivielso, Carlos Fernandez
    Matias, Ignacio R.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 2, PROCEEDINGS, 2006, 4278 : 1347 - 1356
  • [28] User-Centric Privacy Controls for Smart Homes
    Chhetri C.
    Genaro Motti V.
    Proceedings of the ACM on Human-Computer Interaction, 2022, 6 (2 CSCW)
  • [29] User-centric privacy awareness in video surveillance
    Thomas Winkler
    Bernhard Rinner
    Multimedia Systems, 2012, 18 : 99 - 121
  • [30] Security, privacy and trust of user-centric solutions
    Akram, Raja Naeem
    Chen, Hsiao-Hwa
    Lopez, Javier
    Sauveron, Damien
    Yang, Laurence T.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 417 - 420