Statistics on encrypted cloud data

Fu Kuo Tseng, Yung Hsiang Liu, Rong-Jaye Chen, Bao-Shuh Lin 

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with the data in the cleartext form, making it hard to directly apply them to the data in the encrypted form. In this paper, we present a statistical framework to securely and efficiently obtain the statistics on encrypted cloud data through real-time processing. We build our framework on top of the searchable public-key encryption and provide detailed transformation of the statistical procedures for the plain data to those for the encrypted data. We provide detailed descriptions and examples of these transformed statistical procedures. Finally, we provide security analysis and performance evaluation of these transformed procedures and demonstrate the effectiveness and efficiency of the proposed framework.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings
Pages133-150
Number of pages18
DOIs
StatePublished - 1 Dec 2013
Event8th International Workshop on Security, IWSEC 2013 - Okinawa, Japan
Duration: 18 Nov 201320 Nov 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8231 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Workshop on Security, IWSEC 2013
CountryJapan
CityOkinawa
Period18/11/1320/11/13

Keywords

  • efficient transformation of statistical procedures
  • encrypted cloud data
  • online storage services
  • statistical framework
  • statistics

Fingerprint Dive into the research topics of 'Statistics on encrypted cloud data'. Together they form a unique fingerprint.

Cite this