File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/SP.2007.29
- Scopus: eid_2-s2.0-34548774576
- Find via
Conference Paper: Multi-Dimensional Range Query over Encrypted Data
Title | Multi-Dimensional Range Query over Encrypted Data |
---|---|
Authors | |
Keywords | Data Flow Analysis Data Privacy Data Transfer Problem Solving |
Issue Date | 2007 |
Publisher | IEEE |
Citation | Proceedings - Ieee Symposium On Security And Privacy, 2007, p. 350-364 How to Cite? |
Abstract | We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, port numbers, etc.) fall within specific ranges. However, the privacy of all irrelevant flows are still preserved. We formally define the security for MRQED and prove the security of our construction under the decision bilinear Diffie-Hellman and decision linear assumptions in certain bilinear groups. We study the practical performance of our construction in the context of network audit logs. Apartfrom network audit logs, our scheme also has interesting applications for financial audit logs, medical privacy, untrusted remote storage, etc. In particular, we show that MRQED implies a solution to its dual problem, which enables investors to trade stocks through a broker in a privacypreserving manner. ©2007 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/92660 |
ISSN | 2020 SCImago Journal Rankings: 2.407 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shi, E | en_HK |
dc.contributor.author | Bethencourt, J | en_HK |
dc.contributor.author | Chan, THH | en_HK |
dc.contributor.author | Song, D | en_HK |
dc.contributor.author | Perrig, A | en_HK |
dc.date.accessioned | 2010-09-17T10:53:19Z | - |
dc.date.available | 2010-09-17T10:53:19Z | - |
dc.date.issued | 2007 | en_HK |
dc.identifier.citation | Proceedings - Ieee Symposium On Security And Privacy, 2007, p. 350-364 | en_HK |
dc.identifier.issn | 1081-6011 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/92660 | - |
dc.description.abstract | We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and various other applications. Our scheme allows a network gateway to encrypt summaries of network flows before submitting them to an untrusted repository. When network intrusions are suspected, an authority can release a key to an auditor, allowing the auditor to decrypt flows whose attributes (e.g., source and destination addresses, port numbers, etc.) fall within specific ranges. However, the privacy of all irrelevant flows are still preserved. We formally define the security for MRQED and prove the security of our construction under the decision bilinear Diffie-Hellman and decision linear assumptions in certain bilinear groups. We study the practical performance of our construction in the context of network audit logs. Apartfrom network audit logs, our scheme also has interesting applications for financial audit logs, medical privacy, untrusted remote storage, etc. In particular, we show that MRQED implies a solution to its dual problem, which enables investors to trade stocks through a broker in a privacypreserving manner. ©2007 IEEE. | en_HK |
dc.language | eng | en_HK |
dc.publisher | IEEE | en_HK |
dc.relation.ispartof | Proceedings - IEEE Symposium on Security and Privacy | en_HK |
dc.subject | Data Flow Analysis | en_HK |
dc.subject | Data Privacy | en_HK |
dc.subject | Data Transfer | en_HK |
dc.subject | Problem Solving | en_HK |
dc.title | Multi-Dimensional Range Query over Encrypted Data | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Chan, THH:hubert@cs.hku.hk | en_HK |
dc.identifier.authority | Chan, THH=rp01312 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/SP.2007.29 | en_HK |
dc.identifier.scopus | eid_2-s2.0-34548774576 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-34548774576&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 350 | en_HK |
dc.identifier.epage | 364 | en_HK |
dc.publisher.place | United States | en_HK |
dc.identifier.scopusauthorid | Shi, E=7005357410 | en_HK |
dc.identifier.scopusauthorid | Bethencourt, J=15063899600 | en_HK |
dc.identifier.scopusauthorid | Chan, THH=12645073600 | en_HK |
dc.identifier.scopusauthorid | Song, D=7402443870 | en_HK |
dc.identifier.scopusauthorid | Perrig, A=6603929649 | en_HK |
dc.identifier.citeulike | 2227846 | - |
dc.identifier.issnl | 1081-6011 | - |