Outsourcing data on the cloud poses many challenges related to data owners and users privacy, specially when some data processing capabilities are delegated to the cloud infrastructure. In this paper we address the problem of executing privacy-preserving equality queries in a scenario where multiple data owners outsource their databases to an untrusted cloud service provider, accepting encrypted queries coming from authorized users. We propose a highly scalable proxy re-encryption scheme so that (i) the cloud service provider can return only the encrypted data that satisfies user's query without decrypting it, and (ii) the encrypted results can be decrypted using the user's key. We analyze the computation efficiency and the security of the scheme against proxy under the standard Diffie-Hellman assumption, reporting also some experimental results, which show encouraging speed up in comparison with previously proposed similar schemes.

Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries / M. Sepehri, S. Cimato, E. Damiani, C.Y. Yeun - In: Trustcom/BigDataSE/ISPA, 2015 IEEE. 1Prima edizione. - [s.l] : IEEE, 2015. - ISBN 9781467379526. - pp. 1357-1362 (( Intervento presentato al 7. convegno UbiSafe Computing held in conjunction tenutosi a Helsink nel 2015.

Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries

M. Sepehri
Primo
;
S. Cimato
Secondo
;
E. Damiani
Penultimo
;
2015

Abstract

Outsourcing data on the cloud poses many challenges related to data owners and users privacy, specially when some data processing capabilities are delegated to the cloud infrastructure. In this paper we address the problem of executing privacy-preserving equality queries in a scenario where multiple data owners outsource their databases to an untrusted cloud service provider, accepting encrypted queries coming from authorized users. We propose a highly scalable proxy re-encryption scheme so that (i) the cloud service provider can return only the encrypted data that satisfies user's query without decrypting it, and (ii) the encrypted results can be decrypted using the user's key. We analyze the computation efficiency and the security of the scheme against proxy under the standard Diffie-Hellman assumption, reporting also some experimental results, which show encouraging speed up in comparison with previously proposed similar schemes.
Settore INF/01 - Informatica
   PRACTICE: Privacy-Preserving Computation in the Cloud
   PRACTICE
   EUROPEAN COMMISSION
   FP7
   609611

   Security Horizons
   MINISTERO DELL'ISTRUZIONE E DEL MERITO
   2010XSEMLC_003
2015
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
07345438.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 316.62 kB
Formato Adobe PDF
316.62 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/357814
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 21
  • ???jsp.display-item.citation.isi??? 17
social impact