Statistics on Encrypted Cloud Data
نویسندگان
چکیده
As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with the data in the cleartext form, making it hard to directly apply them to the data in the encrypted form. In this paper, we present a statistical framework to securely and efficiently obtain the statistics on encrypted cloud data through real-time processing. We build our framework on top of the searchable public-key encryption and provide detailed transformation of the statistical procedures for the plain data to those for the encrypted data. We provide detailed descriptions and examples of these transformed statistical procedures. Finally, we provide security analysis and performance evaluation of these transformed procedures and demonstrate the effectiveness and efficiency of the proposed framework.
منابع مشابه
Fuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملSecure Reversible Data Hiding in Encrypted Image by Reversible Image Transformation (rit)
With the popularity of outsourcing facts to the cloud, it's far vital to shield the privacy of facts and enable the cloud server to effortlessly control the data at the same time. Under such needs, reversible statistics hiding in encrypted photos (RDH-EI) attracts increasingly more researchers’ attention. In this paper, we suggest a singular framework for RDH-EI primarily based on reversible ph...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملSecure and Sustainable Benchmarking in Clouds - A Multi-Party Cloud Application with an Untrusted Service Provider
Cloud computing entails a novel security threat: The cloud service provider is entrusted with all of the data of all its customers and may accidentally or maliciously disclose it to third parties. While the service provider may take the necessary precautions in order to protect the confidentiality of the data from outsiders or other customers, the service provider usually inadvertently learns t...
متن کامل