Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
暂无分享,去创建一个
[1] Philippe Gaborit,et al. A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol , 2007, IACR Cryptol. ePrint Arch..
[2] Tarik Moataz,et al. Boolean symmetric searchable encryption , 2013, ASIA CCS '13.
[3] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[4] Moti Yung,et al. Order-Preserving Encryption Secure Beyond One-Wayness , 2014, IACR Cryptol. ePrint Arch..
[5] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[6] Changyu Dong,et al. When private set intersection meets big data: an efficient and scalable protocol , 2013, CCS.
[7] Stratis Ioannidis,et al. GraphSC: Parallel Secure Computation Made Easy , 2015, 2015 IEEE Symposium on Security and Privacy.
[8] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[9] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[10] Jung Hee Cheon,et al. Cryptanalysis of the New CLT Multilinear Maps , 2015, IACR Cryptol. ePrint Arch..
[11] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[12] Kaoru Kurosawa,et al. UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.
[13] Florian Kerschbaum,et al. Frequency-Hiding Order-Preserving Encryption , 2015, CCS.
[14] Elaine Shi,et al. Automating Efficient RAM-Model Secure Computation , 2014, 2014 IEEE Symposium on Security and Privacy.
[15] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[16] Melissa Chase,et al. Substring-Searchable Symmetric Encryption , 2015, Proc. Priv. Enhancing Technol..
[17] Travis Mayberry,et al. PIRMAP: Efficient Private Information Retrieval for MapReduce , 2013, Financial Cryptography.
[18] Florian Kerschbaum,et al. Collusion-resistant outsourcing of private set intersection , 2012, SAC '12.
[19] Kim-Kwang Raymond Choo,et al. Distributed filesystem forensics: XtreemFS as a case study , 2014, Digit. Investig..
[20] Kim-Kwang Raymond Choo,et al. Remote Wiping and Secure Deletion on Mobile Devices: A Review , 2016, Journal of forensic sciences.
[21] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[22] Jian Wang,et al. Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).
[23] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, TCC.
[24] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[25] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[26] Florian Kerschbaum,et al. Optimal Average-Complexity Ideal-Security Order-Preserving Encryption , 2014, CCS.
[27] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[28] Ian Goldberg,et al. Outsourced private information retrieval , 2013, WPES.
[29] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[30] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[31] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[32] Kim-Kwang Raymond Choo,et al. Impacts of increasing volume of digital forensic data: A survey and future research challenges , 2014, Digit. Investig..
[33] Marcel Keller,et al. Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..
[34] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[35] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..
[36] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[37] Yihua Zhang,et al. PICCO: a general-purpose compiler for private distributed computation , 2013, CCS.
[38] Stefano Tessaro,et al. Oblivious Parallel RAM: Improved Efficiency and Generic Constructions , 2016, TCC.
[39] Tsuyoshi Takagi,et al. Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database , 2016, ACISP.
[40] Omer Paneth,et al. On the Achievability of Simulation-Based Security for Functional Encryption , 2013, CRYPTO.
[41] Nickolai Zeldovich,et al. An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.
[42] Erik Meijer. The world according to LINQ , 2011, CACM.
[43] Tsuyoshi Takagi,et al. Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..
[44] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[45] Vinod Vaikuntanathan,et al. Functional Encryption with Bounded Collusions via Multi-party Computation , 2012, CRYPTO.
[46] Florian Kerschbaum,et al. Searchable Encryption with Secure and Efficient Updates , 2014, CCS.
[47] Kim-Kwang Raymond Choo. Cloud computing: Challenges and future directions , 2010 .
[48] Panos Kalnis,et al. Outsourced Similarity Search on Metric Data Assets , 2012, IEEE Transactions on Knowledge and Data Engineering.
[49] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[50] Hugo Krawczyk,et al. Rich Queries on Encrypted Data: Beyond Exact Matches , 2015, ESORICS.
[51] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[52] Yupu Hu,et al. Cryptanalysis of GGH Map , 2016, EUROCRYPT.
[53] Mariana Raykova,et al. Scaling Private Set Intersection to Billion-Element Sets , 2014, Financial Cryptography.
[54] Amit Sahai,et al. Worry-free encryption: functional encryption with public keys , 2010, CCS '10.
[55] Ilan Komargodski,et al. From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting , 2015, IACR Cryptol. ePrint Arch..
[56] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[57] Charalampos Papamanthou,et al. Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..
[58] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[59] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[60] Srinivas Devadas,et al. RAW Path ORAM: A Low-Latency, Low-Area Hardware ORAM Controller with Integrity Verification , 2014, IACR Cryptol. ePrint Arch..
[61] Vinod Vaikuntanathan,et al. Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..
[62] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, EUROCRYPT.
[63] Ahmad-Reza Sadeghi,et al. TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits , 2015, 2015 IEEE Symposium on Security and Privacy.
[64] Wei Zhang,et al. Encrypted Set Intersection Protocol for Outsourced Datasets , 2014, 2014 IEEE International Conference on Cloud Engineering.
[65] Michael T. Goodrich,et al. Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation , 2010, ICALP.
[66] Kim-Kwang Raymond Choo,et al. Enterprise Social Networks: A Successful Implementation within a Telecommunication Company , 2015, AMCIS.
[67] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[68] Shucheng Yu,et al. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[69] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[70] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2010, IACR Cryptol. ePrint Arch..
[71] Elaine Shi,et al. Practical Dynamic Searchable Encryption with Small Leakage , 2014, NDSS.
[72] Sergey Yekhanin,et al. Locally Decodable Codes and Private Information Retrieval Schemes , 2010, Information Security and Cryptography.
[73] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[74] Kim-Kwang Raymond Choo,et al. Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms , 2015, J. Organ. Comput. Electron. Commer..
[75] Elisa Bertino,et al. Private Information Retrieval , 2013, Private Information Retrieval.
[76] Shouhuai Xu,et al. Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data , 2015, 2015 IEEE International Conference on Cloud Engineering.
[77] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[78] Kartik Nayak,et al. Oblivious Data Structures , 2014, IACR Cryptol. ePrint Arch..
[79] Carl A. Gunter,et al. Controlled Functional Encryption , 2014, CCS.
[80] Angelos D. Keromytis,et al. Blind Seer: A Scalable Private DBMS , 2014, 2014 IEEE Symposium on Security and Privacy.
[81] A. E. Hoerl,et al. Ridge regression: biased estimation for nonorthogonal problems , 2000 .
[82] John R. Anderson,et al. MACHINE LEARNING An Artificial Intelligence Approach , 2009 .
[83] David Cash,et al. The Locality of Searchable Symmetric Encryption , 2014, IACR Cryptol. ePrint Arch..
[84] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[85] Ian S. Osborne. Dealing with big data , 2015 .
[86] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[87] Kai-Min Chung,et al. Oblivious Parallel RAM and Applications , 2016, TCC.
[88] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[89] Ray Bernard,et al. Information Lifecycle Security Risk Assessment: A tool for closing security gaps , 2007, Comput. Secur..
[90] David J. Wu,et al. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds , 2016, IACR Cryptol. ePrint Arch..
[91] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[92] Tsuyoshi Takagi,et al. Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data , 2014, IEICE Trans. Inf. Syst..
[93] Tsuyoshi Takagi,et al. Secure k-NN computation on encrypted cloud data without sharing key with query users , 2013, Cloud Computing '13.
[94] Michael Hicks,et al. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations , 2014, 2014 IEEE Symposium on Security and Privacy.
[95] Vijayan Sugumaran,et al. Building knowledge base of urban emergency events based on crowdsourcing of social media , 2016, Concurr. Comput. Pract. Exp..
[96] Qiaoyan Wen,et al. A View about Cloud Data Security from Data Life Cycle , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.
[97] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[98] Arkady Yerukhimovich,et al. POPE: Partial Order Preserving Encoding , 2016, CCS.
[99] Ruixuan Li,et al. Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.
[100] Nikos Mamoulis,et al. Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.
[101] Kai-Min Chung,et al. Cryptography for Parallel RAM from Indistinguishability Obfuscation , 2016, ITCS.
[102] Srinivas Devadas,et al. Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).
[103] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[104] Elisa Bertino,et al. Secure kNN Query Processing in Untrusted Cloud Environments , 2014, IEEE Transactions on Knowledge and Data Engineering.
[105] Abhi Shelat,et al. PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation , 2013, USENIX Security Symposium.
[106] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[107] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[108] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[109] Pieter H. Hartel,et al. Searching Keywords with Wildcards on Encrypted Data , 2010, SCN.
[110] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[111] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[112] Jonathan Katz,et al. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose , 2013, CRYPTO.
[113] Shucheng Yu,et al. Efficient privacy-preserving biometric identification in cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.
[114] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[115] Florian Kerschbaum,et al. Outsourced private set intersection using homomorphic encryption , 2012, ASIACCS '12.
[116] Murat Kantarcioglu,et al. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation , 2012, NDSS.
[117] Silvio Micali,et al. The Notion of Security for Probabilistic Cryptosystems , 1986, CRYPTO.
[118] Keke Chen,et al. Towards Attack-Resilient Geometric Data Perturbation , 2007, SDM.
[119] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[120] Carl A. Gunter,et al. Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.
[121] Sheng Zhong,et al. Privacy-Preserving Backpropagation Neural Network Learning , 2009, IEEE Transactions on Neural Networks.
[122] Abhi Shelat,et al. Billion-Gate Secure Computation with Malicious Adversaries , 2012, USENIX Security Symposium.
[123] Feifei Li,et al. Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[124] Elaine Shi,et al. Multi-cloud oblivious storage , 2013, CCS.
[125] C. Lynch. Big data: How do your data grow? , 2008, Nature.
[126] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[127] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[128] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[129] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[130] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[131] Kim-Kwang Raymond Choo,et al. framework for digital forensic evidence : Storage , intelligence , review and archive , 2014 .
[132] Craig Gentry,et al. Private Database Access with HE-over-ORAM Architecture , 2015, ACNS.
[133] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[134] Abhi Shelat,et al. SCORAM: Oblivious RAM for Secure Computation , 2014, IACR Cryptol. ePrint Arch..
[135] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[136] Craig Gentry,et al. Optimizing ORAM and Using It Efficiently for Secure Computation , 2013, Privacy Enhancing Technologies.
[137] Mark Zhandry,et al. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation , 2015, EUROCRYPT.
[138] Carmit Hazay,et al. Efficient Set Operations in the Presence of Malicious Adversaries , 2010, Public Key Cryptography.
[139] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[140] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[141] Sanjam Garg,et al. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption , 2016, CRYPTO.
[142] Sotirios Terzis,et al. O-PSI: Delegated Private Set Intersection on Outsourced Datasets , 2015, SEC.
[143] Roberto Di Pietro,et al. PRISM - Privacy-Preserving Search in MapReduce , 2012, Privacy Enhancing Technologies.
[144] Tsuyoshi Takagi,et al. Secure k-NN query on encrypted cloud database without key-sharing , 2013, Int. J. Electron. Secur. Digit. Forensics.
[145] Sebastian Gajek. Dynamic Symmetric Searchable Encryption from Constrained Functional Encryption , 2016, CT-RSA.
[146] Kim-Kwang Raymond Choo,et al. Big forensic data reduction: digital forensic images and electronic evidence , 2016, Cluster Computing.
[147] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[148] Kim-Kwang Raymond Choo,et al. User profiling in intrusion detection: A review , 2016, J. Netw. Comput. Appl..
[149] Ethem Alpaydin,et al. Introduction to machine learning , 2004, Adaptive computation and machine learning.
[150] Andreas Peter,et al. A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..
[151] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[152] Wei Jiang,et al. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[153] David J. Wu,et al. Practical Order-Revealing Encryption with Limited Leakage , 2016, FSE.
[154] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[155] Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries , 2013, CRYPTO.
[156] Hugo Krawczyk,et al. Outsourced symmetric private information retrieval , 2013, IACR Cryptol. ePrint Arch..
[157] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[158] Ran Canetti,et al. Modular Order-Preserving Encryption, Revisited , 2015, SIGMOD Conference.
[159] Moni Naor,et al. Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations , 2016, STOC.
[160] Kun Liu,et al. An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining , 2006, PKDD.
[161] Kim-Kwang Raymond Choo,et al. Android mobile VoIP apps: a survey and examination of their security and privacy , 2016, Electron. Commer. Res..
[162] Kai-Min Chung,et al. Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs , 2015, CRYPTO.
[163] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[164] Tal Malkin,et al. Malicious-Client Security in Blind Seer: A Scalable Private DBMS , 2015, 2015 IEEE Symposium on Security and Privacy.
[165] Abhishek Jain,et al. Indistinguishability Obfuscation from Compact Functional Encryption , 2015, CRYPTO.
[166] Kui Ren,et al. CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud , 2015, ESORICS.
[167] Jonathan Katz,et al. Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces , 2012, CT-RSA.
[168] Kim-Kwang Raymond Choo,et al. Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles , 2016, J. Netw. Comput. Appl..
[169] Paul Zikopoulos,et al. Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data , 2011 .
[170] Kim-Kwang Raymond Choo,et al. Building spatial temporal relation graph of concepts pair using web repository , 2016, Information Systems Frontiers.
[171] Elaine Shi,et al. ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.
[172] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[173] Stratis Ioannidis,et al. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.
[174] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[175] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[176] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[177] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..