語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Towards Better Data Privacy and Utility in the Untrusted Cloud.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Towards Better Data Privacy and Utility in the Untrusted Cloud./
作者:
Xu, Min.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
181 p.
附註:
Source: Dissertations Abstracts International, Volume: 82-07, Section: B.
Contained By:
Dissertations Abstracts International82-07B.
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28151452
ISBN:
9798557022552
Towards Better Data Privacy and Utility in the Untrusted Cloud.
Xu, Min.
Towards Better Data Privacy and Utility in the Untrusted Cloud.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 181 p.
Source: Dissertations Abstracts International, Volume: 82-07, Section: B.
Thesis (Ph.D.)--The University of Chicago, 2020.
This item is not available from ProQuest Dissertations & Theses.
Users data are stored and utilized in the cloud for various purposes. How to best utilize these data while at the same time preserving the privacy of their owners is a challenging problem. In this dissertation, we focus on three important cloud applications, and propose solutions to enhance the privacy-utility tradeoffs of the existing ones.The first application is the federated SQL processing, where multiple mutually-untrusted data owners hold valuable data of their own, and want to execute joint SQL queries on these data without leaking information about individual records in their own shares. The second one is the cloud data collection and analysis, where services collect their users data, with proper privacy guarantees, and want to enable expressive and accurate analysis on the collected data. The last one is the end-to-end encrypted data retrieval, where a single data owner outsources her end-to-end encrypted data to the cloud, and, later, wants to retrieve some of them that are most relevant to the keyword queries requests.After comprehensive literature review of the existing solutions, we realize that the privacy- utility tradeoffs of state of the art can be substantially improved. For federated SQL processing, existing solutions leverage trusted hardware for efficient and secure computations in the cloud, while subsequent work demonstrate the devastating side-channel vulnerability of these solutions. We mitigate such vulnerability to improve the existing solutions. For data collection and analysis, existing solutions do not support joint analysis across data collected by separate services, and the supported analytics is limited, i.e., counting frequency of certain value. We propose new mechanisms and estimation algorithms to achieve better utility on the collected data. For end-to-end encrypted data retrieval, existing solutions are vulnerable to the powerful yet practical file-injection attacks, and we propose new constructions that can defend against such attacks, with practical performance.We thoroughly analyze the privacy and utility of the proposed solutions, when necessary. We also implement prototypes for all the solutions, and conduct extensive evaluations to show the performance of our proposed solutions.
ISBN: 9798557022552Subjects--Topical Terms:
523869
Computer science.
Subjects--Index Terms:
Cloud computing
Towards Better Data Privacy and Utility in the Untrusted Cloud.
LDR
:03638nmm a2200445 4500
001
2344599
005
20220531064604.5
008
241004s2020 ||||||||||||||||| ||eng d
020
$a
9798557022552
035
$a
(MiAaPQ)AAI28151452
035
$a
AAI28151452
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Xu, Min.
$3
811471
245
1 0
$a
Towards Better Data Privacy and Utility in the Untrusted Cloud.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
181 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-07, Section: B.
500
$a
Advisor: Cash, David.
502
$a
Thesis (Ph.D.)--The University of Chicago, 2020.
506
$a
This item is not available from ProQuest Dissertations & Theses.
506
$a
This item must not be sold to any third party vendors.
520
$a
Users data are stored and utilized in the cloud for various purposes. How to best utilize these data while at the same time preserving the privacy of their owners is a challenging problem. In this dissertation, we focus on three important cloud applications, and propose solutions to enhance the privacy-utility tradeoffs of the existing ones.The first application is the federated SQL processing, where multiple mutually-untrusted data owners hold valuable data of their own, and want to execute joint SQL queries on these data without leaking information about individual records in their own shares. The second one is the cloud data collection and analysis, where services collect their users data, with proper privacy guarantees, and want to enable expressive and accurate analysis on the collected data. The last one is the end-to-end encrypted data retrieval, where a single data owner outsources her end-to-end encrypted data to the cloud, and, later, wants to retrieve some of them that are most relevant to the keyword queries requests.After comprehensive literature review of the existing solutions, we realize that the privacy- utility tradeoffs of state of the art can be substantially improved. For federated SQL processing, existing solutions leverage trusted hardware for efficient and secure computations in the cloud, while subsequent work demonstrate the devastating side-channel vulnerability of these solutions. We mitigate such vulnerability to improve the existing solutions. For data collection and analysis, existing solutions do not support joint analysis across data collected by separate services, and the supported analytics is limited, i.e., counting frequency of certain value. We propose new mechanisms and estimation algorithms to achieve better utility on the collected data. For end-to-end encrypted data retrieval, existing solutions are vulnerable to the powerful yet practical file-injection attacks, and we propose new constructions that can defend against such attacks, with practical performance.We thoroughly analyze the privacy and utility of the proposed solutions, when necessary. We also implement prototypes for all the solutions, and conduct extensive evaluations to show the performance of our proposed solutions.
590
$a
School code: 0330.
650
4
$a
Computer science.
$3
523869
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Business administration.
$3
3168311
650
4
$a
Information technology.
$3
532993
653
$a
Cloud computing
653
$a
Data privacy
653
$a
Differential privacy
653
$a
Encrypted search
653
$a
Cybersecurity
653
$a
Side channel
653
$a
Federated SQL processing
653
$a
File-injection attacks
690
$a
0984
690
$a
0489
690
$a
0310
690
$a
0464
690
$a
0454
710
2
$a
The University of Chicago.
$b
Computer Science.
$3
1674744
773
0
$t
Dissertations Abstracts International
$g
82-07B.
790
$a
0330
791
$a
Ph.D.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28151452
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9467037
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入