DocumentCode :
561253
Title :
Encrypted processes for oblivious data retrieval
Author :
Gahi, Youssef ; Guennoun, Mouhcine ; Guennoun, Zouhair ; El-Khatib, Khalil
Author_Institution :
Ecole Mohammadia d´´Ing. - EMI, Univ. Mohammed V-Agdal, Rabat, Morocco
fYear :
2011
fDate :
11-14 Dec. 2011
Firstpage :
514
Lastpage :
518
Abstract :
Cloud computing is a distributed technology that can extend the resources available for computers connected to the Internet. Computers can benefit from remote servers to gain extra storage capacities or to execute complex computations that require extended memories. However, the cloud fails to employ sufficient security measure to preserve the privacy of each client connecting to it. In this paper, we present novel techniques that enable servers to process encrypted data without the need to decrypt such data. Furthermore, clients are able to ask remote machines to perform their requests through encrypted processes. Using these techniques, a malicious party can neither access the manipulated data nor learn the nature of the operations executed over them. A prototype has been built to investigate the performance of our techniques. This prototype is capable of executing oblivious database queries over encrypted data and it has been used to prove the practicality of the proposed techniques.
Keywords :
cloud computing; cryptography; data privacy; query processing; Internet; client privacy preservation; cloud computing; data retrieval; database queries; distributed technology; malicious party; process encryption; remote machines; Cloud computing; Databases; Encryption; Logic gates; Privacy; Servers; Cloud computing; Data Retrieval; Encrypted Processes; Homomorphic Encryption Schemes;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2011 International Conference for
Conference_Location :
Abu Dhabi
Print_ISBN :
978-1-4577-0884-8
Type :
conf
Filename :
6148390
Link To Document :
بازگشت