TY - GEN
T1 - Statistics on encrypted cloud data
AU - Tseng, Fu Kuo
AU - Liu, Yung Hsiang
AU - Chen, Rong-Jaye
AU - Lin , Bao-Shuh
PY - 2013
Y1 - 2013
N2 - As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with the data in the cleartext form, making it hard to directly apply them to the data in the encrypted form. In this paper, we present a statistical framework to securely and efficiently obtain the statistics on encrypted cloud data through real-time processing. We build our framework on top of the searchable public-key encryption and provide detailed transformation of the statistical procedures for the plain data to those for the encrypted data. We provide detailed descriptions and examples of these transformed statistical procedures. Finally, we provide security analysis and performance evaluation of these transformed procedures and demonstrate the effectiveness and efficiency of the proposed framework.
AB - As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with the data in the cleartext form, making it hard to directly apply them to the data in the encrypted form. In this paper, we present a statistical framework to securely and efficiently obtain the statistics on encrypted cloud data through real-time processing. We build our framework on top of the searchable public-key encryption and provide detailed transformation of the statistical procedures for the plain data to those for the encrypted data. We provide detailed descriptions and examples of these transformed statistical procedures. Finally, we provide security analysis and performance evaluation of these transformed procedures and demonstrate the effectiveness and efficiency of the proposed framework.
KW - efficient transformation of statistical procedures
KW - encrypted cloud data
KW - online storage services
KW - statistical framework
KW - statistics
UR - http://www.scopus.com/inward/record.url?scp=84891935903&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-41383-4_9
DO - 10.1007/978-3-642-41383-4_9
M3 - Conference contribution
AN - SCOPUS:84891935903
SN - 9783642413827
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 133
EP - 150
BT - Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Proceedings
T2 - 8th International Workshop on Security, IWSEC 2013
Y2 - 18 November 2013 through 20 November 2013
ER -