Lectures 4 + 5 : The ( In ) Security of Encrypted Search
نویسنده
چکیده
data types. An abstract data type is a collection of objects together with a set of operations defined on those objects. Examples include sets, dictionaries (also known as key-value stores or associative arrays) and graphs. The operations associated with a data type fall into one of two categories: query operations, which return information about the objects; and update operations, which modify the objects. If the data type supports only query operations it is static, otherwise it is dynamic. For simplicity we define data types as having a single operation but note that the definitions can be extended to capture multiple operations in the natural way. Data structures. A data structure for type a T is a concrete representation of type-T objects in some computational model. For us, the underlying model will always the random access machine (RAM) model of computation. The structure used to represent a type-T object is usually optimized to support the queries associated with T as efficiently as possible; that is, one designs the structure in such a way that there is an efficient algorithm to evaluate these queries. For data types that support multiple queries, the structure is usually designed to efficiently support as many of T ’s queries as possible. As a concrete example, the dictionary data type can be represented using various data structures depending on which queries one wants to support efficiently: hash tables support Get and Put in expected O(1) time whereas balanced binary search trees support both operations in worst-case log(n) time. We model a type-T data structure as a collection of three ensembles S = {Sk}k∈N, Q = {Qk}k∈N and A = {Ak}k∈N. If a type-T structure DS supports only a single query, we often write DS(q) to denote the answer a ∈ Ak that results from querying DS on q ∈ Qk.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملBrowse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملKamara Lectures 6 + 7 : Zero - Leakage Solutions
In the first lecture we covered—at a high level—several ways to search on encrypted data. We also mentioned that for all solutions, there is a tradeoff between efficiency, security and expressiveness. Here we will cover one extreme of the solution space: the zero-leakage or leakage-free solutions. Note that by zero-leakage we do not mean that nothing is leaked. Rather, what we mean is that what...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016