The Community for Technology Leaders
2014 IEEE International Conference on Cloud Engineering (IC2E) (2014)
Boston, MA, USA
March 11, 2014 to March 14, 2014
ISBN: 978-1-4799-3766-0
pp: 0
Secure and efficient data storage and computation for an outsourced database is a primary concern for users, especially with the push for cloud computing that affords both compute and resource scalability. Among the diverse secure building blocks for secure analytical computations on outsourced databases, the encrypted set intersection operation extracts common sensitive information from datasets belonging to different users. In existing methods, each user holds their sensitive data and all users follow a secure protocol to perform set intersection. This approach is not applicable to the cloud platform, where data resides in the cloud platform in encrypted form and not at each user site. To address this limitation, in this paper, we design the Encrypted Set Intersection Protocol (ESIP) that allows server and users to perform collaborative operations to obtain the correct set intersection result without violating privacy of data contributed by each user at the server.
Servers, Protocols, Encryption, Complexity theory, Collaboration

F. Liu, W. K. Ng, W. Zhang, D. H. Giang and S. Han, "Encrypted Set Intersection Protocol for Outsourced Datasets," 2014 IEEE International Conference on Cloud Engineering (IC2E), Boston, MA, USA, 2014, pp. .
93 ms
(Ver 3.3 (11022016))