Scaling cryptographic techniques by exploiting data sensitivity at a public cloud

  • Sharad Mehrotra
  • , Shantanu Sharma
  • , Jeffrey D. Ullman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Despite extensive research on cryptography, secure and efficient query processing over outsourced data remains an open challenge. This poster continues along the emerging trend in secure data processing that recognizes that the entire dataset may not be sensitive, and hence, non-sensitivity of data can be exploited to overcome some of the limitations of existing encryption-based approaches. In particular, this poster outlines a new secure keyword search approach, called query keyword binning (QB) that allows non-sensitive parts of the data to be outsourced in clear-text while guaranteeing that no information is leaked by joint processing of non-sensitive data (in clear-text) and sensitive data (in encrypted form). QB improves the performance of and strengthens the security of the underlying cryptographic technique by preventing size, frequency-count, and workload-skew attacks.

Original languageEnglish
Title of host publicationCODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages165-167
Number of pages3
ISBN (Electronic)9781450360999
DOIs
StatePublished - 13 Mar 2019
Externally publishedYes
Event9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019 - Richardson, United States
Duration: 25 Mar 201927 Mar 2019

Publication series

NameCODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy

Conference

Conference9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019
Country/TerritoryUnited States
CityRichardson
Period25/03/1927/03/19

Keywords

  • Cryptographic techniques
  • Scalability

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'Scaling cryptographic techniques by exploiting data sensitivity at a public cloud'. Together they form a unique fingerprint.

Cite this