Volltext-Downloads (blau) und Frontdoor-Views (grau)

Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing

  • In the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirementsIn the work at hand, we combine a Private Information Retrieval (PIR) protocol with Somewhat Homomorphic Encryption (SHE) and use Searchable Encryption (SE) with the objective to provide security and confidentiality features for a third party cloud security audit. During the auditing process, a third party auditor will act on behalf of a cloud service user to validate the security requirements performed by a cloud service provider. Our concrete contribution consists of developing a PIR protocol which is proceeding directly on a log database of encrypted data and allowing to retrieve a sum or a product of multiple encrypted elements. Subsequently, we concretely apply our new form of PIR protocol to a cloud audit use case where searchable encryption is employed to allow additional confidentiality requirements to the privacy of the user. Exemplarily we are considering and evaluating an audit of client accesses to a controlled resource provided by a cloud service provider.show moreshow less

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Document Type:Conference Proceeding
Conference Type:Konferenzartikel
Zitierlink: https://opus.hs-offenburg.de/2269
Bibliografische Angaben
Title (English):Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing
Conference:ICITST: International Conference for Internet Technology and Secured Transactions (11. : 05-07 December 2016 : Barcelona, Spain)
Author:Louis TajanStaff Member, Dirk WesthoffStaff MemberGND, Frederik Armknecht, Christian A. Reuter
Year of Publication:2016
Publisher:IEEE
First Page:162
Last Page:169
Parent Title (English):2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
ISBN:978-1-908320-73-5 (Elektronisch)
ISBN:978-1-5090-4852-6 (Print on Demand)
DOI:https://doi.org/10.1109/ICITST.2016.7856690
Language:English
Inhaltliche Informationen
Institutes:Forschung / ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019)
Institutes:Bibliografie
Tag:Cloud computing; Informationsvermittlung; Kryoptologie
Formale Angaben
Open Access: Closed Access 
Licence (German):License LogoUrheberrechtlich geschützt