Loading...

Private Set Operations Over Encrypted Data in Cloud Computing

Rafiee Karkevandi, Mojtaba | 2020

878 Viewed
  1. Type of Document: Ph.D. Dissertation
  2. Language: Farsi
  3. Document No: 53552 (02)
  4. University: Sharif University of Technology
  5. Department: Mathematical Sciences
  6. Advisor(s): Khazaei, Shahram
  7. Abstract:
  8. In recent years, different cryptographic tools have been introduced for a wide range of cloud computing applications that can be classified based on a trade-off between performance and security. In this thesis, we introduced the private set operation schemes, and at their heart, private set intersection schemes, in the cloud computing platform. These schemes are of particular importance because they can be used as basic cryptographic schemes for a wide range of functionalities in the cloud platform. Using these schemes, the user can securely store datasets on the cloud, run set queries remotely and receive the desired results. To this end, we first modeled the syntax and the security notions for the aforementioned schemes. Then, to demonstrate the feasibility of these notions, we presented several constructions with significantly reduced computational, storage and communication overheads compared to other constructions with similar functionalities. Also, in addition to providing a sequence of security notions that enable us to parameterize performance and security, we revised the definitions for the standard simulation-based and indistinguishability-based security notions known in the literature. Finally, we examined and determined the relationships between the security notions provided for these schemes
  9. Keywords:
  10. Cloud Computing ; Private Set Intersections ; Confidentiality ; Searchable Encryption ; Data Outsourcing ; Private Set Operations

 Digital Object List