Skip to main content
Journal cover image

Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud

Publication ,  Conference
Wei, L; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
October 4, 2013

Cloud storage, and more specifically the encryption of file contents to protect them in the cloud, can interfere with access to these files by partially trusted third-party service providers and customers. To support such access for pattern-matching applications (e.g., malware scanning), we present a protocol that enables a client authorized by the data owner to evaluate a deterministic finite automaton (DFA) on a file stored at a server (the cloud), even though the file is encrypted by the data owner for protection from the server. Our protocol contributes over previous work by enabling the client to detect any misbehavior of the server; in particular, the client can verify that the result of its DFA evaluation is based on the file stored there by the data owner, and in this sense the file and protocol result are authenticated to the client. Our protocol also protects the privacy of the file and the DFA from the server, and the privacy of the file (except the result of evaluating the DFA on it) from the client. A special case of our protocol solves private DFA evaluation on a private and authenticated file in the traditional two-party model, in which the file contents are known to the server. Our protocol provably achieves these properties for an arbitrarily malicious server and an honest-but-curious client, in the random oracle model. © 2013 Springer-Verlag.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783642402029

Publication Date

October 4, 2013

Volume

8134 LNCS

Start / End Page

147 / 163

Related Subject Headings

  • Artificial Intelligence & Image Processing
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wei, L., & Reiter, M. K. (2013). Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8134 LNCS, pp. 147–163). https://doi.org/10.1007/978-3-642-40203-6_9
Wei, L., and M. K. Reiter. “Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8134 LNCS:147–63, 2013. https://doi.org/10.1007/978-3-642-40203-6_9.
Wei L, Reiter MK. Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2013. p. 147–63.
Wei, L., and M. K. Reiter. “Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8134 LNCS, 2013, pp. 147–63. Scopus, doi:10.1007/978-3-642-40203-6_9.
Wei L, Reiter MK. Ensuring file authenticity in private DFA evaluation on encrypted files in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2013. p. 147–163.
Journal cover image

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

ISBN

9783642402029

Publication Date

October 4, 2013

Volume

8134 LNCS

Start / End Page

147 / 163

Related Subject Headings

  • Artificial Intelligence & Image Processing