Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Privacy-Preserving Regular Expressio...
~
Wei, Lei.
Linked to FindBook
Google Book
Amazon
博客來
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Privacy-Preserving Regular Expression Evaluation on Encrypted Data./
Author:
Wei, Lei.
Description:
108 p.
Notes:
Source: Dissertation Abstracts International, Volume: 75-01(E), Section: B.
Contained By:
Dissertation Abstracts International75-01B(E).
Subject:
Computer science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3594237
ISBN:
9781303379246
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
Wei, Lei.
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
- 108 p.
Source: Dissertation Abstracts International, Volume: 75-01(E), Section: B.
Thesis (Ph.D.)--The University of North Carolina at Chapel Hill, 2013.
Motivated by the need to outsource file storage to untrusted clouds while still permitting controlled use of that data by authorized third parties, in this dissertation we present a family of protocols by which a client can evaluate a regular expression on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. We present a protocol that provably protects the privacy of the regular expression and the file contents from a malicious server and the privacy of the file contents (except for the evaluation result) from an honest-but-curious client. We then extend this protocol in two primary directions. In one direction, we develop a strengthened protocol that enables the client to detect any misbehavior of the server; in particular, the client can verify that the result of its regular-expression evaluation is based on the authentic file stored there by the data owner, and in this sense the file and evaluation result are authenticated to the client.
ISBN: 9781303379246Subjects--Topical Terms:
523869
Computer science.
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
LDR
:02744nmm a2200277 4500
001
2069940
005
20160524150731.5
008
170521s2013 ||||||||||||||||| ||eng d
020
$a
9781303379246
035
$a
(MiAaPQ)AAI3594237
035
$a
AAI3594237
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Wei, Lei.
$3
3184949
245
1 0
$a
Privacy-Preserving Regular Expression Evaluation on Encrypted Data.
300
$a
108 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-01(E), Section: B.
500
$a
Adviser: Michael Reiter.
502
$a
Thesis (Ph.D.)--The University of North Carolina at Chapel Hill, 2013.
520
$a
Motivated by the need to outsource file storage to untrusted clouds while still permitting controlled use of that data by authorized third parties, in this dissertation we present a family of protocols by which a client can evaluate a regular expression on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. We present a protocol that provably protects the privacy of the regular expression and the file contents from a malicious server and the privacy of the file contents (except for the evaluation result) from an honest-but-curious client. We then extend this protocol in two primary directions. In one direction, we develop a strengthened protocol that enables the client to detect any misbehavior of the server; in particular, the client can verify that the result of its regular-expression evaluation is based on the authentic file stored there by the data owner, and in this sense the file and evaluation result are authenticated to the client.
520
$a
The second direction in which we extend our initial protocol is motivated by the vast adoption of resource-constrained mobile devices, and the fact that our protocols involve relatively intensive client-server interaction and computation on the searching client. We therefore investigate an alternative in which the client (e.g., via her mobile device) can submit her encrypted regular expression to a partially trusted proxy, which then interacts with the server hosting the encrypted data and reports the encrypted evaluation result to the client. Neither the search query nor the result is revealed to an honest-but-curious proxy or malicious server during the process. We demonstrate the practicality of the protocol by prototyping a system to perform regular-expression searches on encrypted emails and evaluate its performance using a real-world email dataset.
590
$a
School code: 0153.
650
4
$a
Computer science.
$3
523869
690
$a
0984
710
2
$a
The University of North Carolina at Chapel Hill.
$b
Computer Science.
$3
1020590
773
0
$t
Dissertation Abstracts International
$g
75-01B(E).
790
$a
0153
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3594237
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9302808
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login