Third-party private DFA evaluation on encrypted files in the cloud
Publication
, Conference
Wei, L; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
September 5, 2012
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a client (the third-party) can evaluate a deterministic finite automaton (DFA) on an encrypted file stored at a server (the cloud), once authorized to do so by the file owner. Our protocols provably protect the privacy of the DFA and the file contents from a malicious server and the privacy of the file contents (except for the result of the evaluation) from an honest-but-curious client (and, heuristically, from a malicious client). We further present simple techniques to detect client or server misbehavior. © 2012 Springer-Verlag.
Duke Scholars
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI
EISSN
1611-3349
ISSN
0302-9743
Publication Date
September 5, 2012
Volume
7459 LNCS
Start / End Page
523 / 540
Related Subject Headings
- Artificial Intelligence & Image Processing
- 46 Information and computing sciences
Citation
APA
Chicago
ICMJE
MLA
NLM
Wei, L., & Reiter, M. K. (2012). Third-party private DFA evaluation on encrypted files in the cloud. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7459 LNCS, pp. 523–540). https://doi.org/10.1007/978-3-642-33167-1_30
Wei, L., and M. K. Reiter. “Third-party private DFA evaluation on encrypted files in the cloud.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7459 LNCS:523–40, 2012. https://doi.org/10.1007/978-3-642-33167-1_30.
Wei L, Reiter MK. Third-party private DFA evaluation on encrypted files in the cloud. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 523–40.
Wei, L., and M. K. Reiter. “Third-party private DFA evaluation on encrypted files in the cloud.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7459 LNCS, 2012, pp. 523–40. Scopus, doi:10.1007/978-3-642-33167-1_30.
Wei L, Reiter MK. Third-party private DFA evaluation on encrypted files in the cloud. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2012. p. 523–540.
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
DOI
EISSN
1611-3349
ISSN
0302-9743
Publication Date
September 5, 2012
Volume
7459 LNCS
Start / End Page
523 / 540
Related Subject Headings
- Artificial Intelligence & Image Processing
- 46 Information and computing sciences