Skip to main content

Third-party private DFA evaluation on encrypted files in the cloud

Publication ,  Conference
Wei, L; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
September 5, 2012

Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a client (the third-party) can evaluate a deterministic finite automaton (DFA) on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. Our protocols provably protect the privacy of the DFA and the file contents from a malicious server and the privacy of the file contents (except for the result of the evaluation) from an honest-but-curious client (and, heuristically, from a malicious client). We further present simple techniques to detect client or server misbehavior. © 2012 Springer-Verlag.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

September 5, 2012

Volume

7459 LNCS

Start / End Page

523 / 540

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wei, L., & Reiter, M. K. (2012). Third-party private DFA evaluation on encrypted files in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 523–540). https://doi.org/10.1007/978-3-642-33167-1_30
Wei, L., and M. K. Reiter. “Third-party private DFA evaluation on encrypted files in the cloud.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7459 LNCS:523–40, 2012. https://doi.org/10.1007/978-3-642-33167-1_30.
Wei L, Reiter MK. Third-party private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 523–40.
Wei, L., and M. K. Reiter. “Third-party private DFA evaluation on encrypted files in the cloud.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7459 LNCS, 2012, pp. 523–40. Scopus, doi:10.1007/978-3-642-33167-1_30.
Wei L, Reiter MK. Third-party private DFA evaluation on encrypted files in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 523–540.

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

September 5, 2012

Volume

7459 LNCS

Start / End Page

523 / 540

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences