語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Privacy-Preserving Regular Expressio...
~
Wei, Lei.
FindBook
Google Book
Amazon
博客來
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Privacy-Preserving Regular Expression Evaluation on Encrypted Data./
作者:
Wei, Lei.
面頁冊數:
108 p.
附註:
Source: Dissertation Abstracts International, Volume: 75-01(E), Section: B.
Contained By:
Dissertation Abstracts International75-01B(E).
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3594237
ISBN:
9781303379246
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
Wei, Lei.
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
- 108 p.
Source: Dissertation Abstracts International, Volume: 75-01(E), Section: B.
Thesis (Ph.D.)--The University of North Carolina at Chapel Hill, 2013.
Motivated by the need to outsource file storage to untrusted clouds while still permitting controlled use of that data by authorized third parties, in this dissertation we present a family of protocols by which a client can evaluate a regular expression on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. We present a protocol that provably protects the privacy of the regular expression and the file contents from a malicious server and the privacy of the file contents (except for the evaluation result) from an honest-but-curious client. We then extend this protocol in two primary directions. In one direction, we develop a strengthened protocol that enables the client to detect any misbehavior of the server; in particular, the client can verify that the result of its regular-expression evaluation is based on the authentic file stored there by the data owner, and in this sense the file and evaluation result are authenticated to the client.
ISBN: 9781303379246Subjects--Topical Terms:
523869
Computer science.
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
LDR
:02744nmm a2200277 4500
001
2069940
005
20160524150731.5
008
170521s2013 ||||||||||||||||| ||eng d
020
$a
9781303379246
035
$a
(MiAaPQ)AAI3594237
035
$a
AAI3594237
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Wei, Lei.
$3
3184949
245
1 0
$a
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
300
$a
108 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-01(E), Section: B.
500
$a
Adviser: Michael Reiter.
502
$a
Thesis (Ph.D.)--The University of North Carolina at Chapel Hill, 2013.
520
$a
Motivated by the need to outsource file storage to untrusted clouds while still permitting controlled use of that data by authorized third parties, in this dissertation we present a family of protocols by which a client can evaluate a regular expression on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. We present a protocol that provably protects the privacy of the regular expression and the file contents from a malicious server and the privacy of the file contents (except for the evaluation result) from an honest-but-curious client. We then extend this protocol in two primary directions. In one direction, we develop a strengthened protocol that enables the client to detect any misbehavior of the server; in particular, the client can verify that the result of its regular-expression evaluation is based on the authentic file stored there by the data owner, and in this sense the file and evaluation result are authenticated to the client.
520
$a
The second direction in which we extend our initial protocol is motivated by the vast adoption of resource-constrained mobile devices, and the fact that our protocols involve relatively intensive client-server interaction and computation on the searching client. We therefore investigate an alternative in which the client (e.g., via her mobile device) can submit her encrypted regular expression to a partially trusted proxy, which then interacts with the server hosting the encrypted data and reports the encrypted evaluation result to the client. Neither the search query nor the result is revealed to an honest-but-curious proxy or malicious server during the process. We demonstrate the practicality of the protocol by prototyping a system to perform regular-expression searches on encrypted emails and evaluate its performance using a real-world email dataset.
590
$a
School code: 0153.
650
4
$a
Computer science.
$3
523869
690
$a
0984
710
2
$a
The University of North Carolina at Chapel Hill.
$b
Computer Science.
$3
1020590
773
0
$t
Dissertation Abstracts International
$g
75-01B(E).
790
$a
0153
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3594237
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9302808
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入