Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
نویسندگان
چکیده
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a client (the third-party) can evaluate a deterministic finite automaton (DFA) on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. Our protocols provably protect the privacy of the DFA and the file contents from a malicious server and the privacy of the file contents (except for the result of the evaluation) from an honest-but-curious client (and, heuristically, from a malicious client). We further present simple techniques to detect client or server misbehavior.
منابع مشابه
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud
Cloud storage, and more specifically the encryption of file contents to protect them in the cloud, can interfere with access to these files by partially trusted third-party service providers and customers. To support such access for pattern-matching applications (e.g., malware scanning), we present a protocol that enables a client authorized by the data owner to evaluate a deterministic finite ...
متن کاملThird-Party DFA Evaluation on Encrypted Files
We present protocols by which a client can evaluate a deterministic finite automaton (DFA) on an encrypted file stored at a server, once authorized to do so by the file owner. Our protocols provably protect the privacy of the DFA and the file contents from a malicious server and the privacy of the file contents (except for the result of the evaluation) from an honest-but-curious client. One of ...
متن کاملFunctional Encryption Algorithm for Communication in Cloud Computing based on Attribute Based Encryption (ABE)
Functional encryption ensures that user can access encrypted data stored over cloud in which the first step is to encrypt the data files {P1, P2,........,Pn) by the data owner using Cipher text policy ABE that result in {C1, C2,........, Cn}. Then upload the encrypted files on a cloud based storage server or on a public cloud. Once the files are uploaded on the cloud the data owner list the pro...
متن کاملSharing Data Homomorphically Encrypted with Different Encryption Keys
In this paper, we propose the first homomorphic based proxy re-encryption (HPRE) solution that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility to process such data remotely. More clearly, this scheme makes possible to switch the public encryption key to another one without the help of a trusted third party. I...
متن کاملCrypto-Nets: Neural Networks over Encrypted Data
The problem we address is the following: how can a user employ a predictive model that is held by a third party, without compromising private information. For example, a hospital may wish to use a cloud service to predict the readmission risk of a patient. However, due to regulations, the patient’s medical files cannot be revealed. The goal is to make an inference using the model, without jeopa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012