Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105665
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorDou, Yen_US
dc.creatorChan, HCBen_US
dc.date.accessioned2024-04-15T07:35:47Z-
dc.date.available2024-04-15T07:35:47Z-
dc.identifier.isbn978-1-5090-5019-2 (Electronic)en_US
dc.identifier.isbn978-1-5090-5020-8 (Print on Demand(PoD))en_US
dc.identifier.urihttp://hdl.handle.net/10397/105665-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsThe following publication Y. Dou and H. C. B. Chan, "Access Pattern Hidden Query over Encrypted Data through Multi-Clouds," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, 2017, pp. 1-6 is available at https://doi.org/10.1109/GLOCOM.2017.8253981.en_US
dc.titleAccess pattern hidden query over encrypted data through multi-cloudsen_US
dc.typeConference Paperen_US
dc.identifier.doi10.1109/GLOCOM.2017.8253981en_US
dcterms.abstractSearchable encryption seeks to support untrusted third parties to conduct direct searching over encrypted data. However, recent research has found that searchable encryption is vulnerable to attacks, which exploit the statistical relationship or pattern identified from encrypted query results. In this paper, we study the problem of access pattern leakage attack on searchable encryption under a multi-cloud environment. Basically, both database records and queries are distributed among different cloud servers, so that each cloud server can only have partial information about queries and their results. To minimize the query response time while protecting information disclosure, we formulate the record and query assignment as an optimization problem, and solve the problem (i.e., finding the best possible solution) by the minimum s-t cut algorithm. Numerical results show that on average 13% access pattern information can be saved by our assignment strategy while maintaining good query response time.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationGLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, 4-8 December 2017, 8253981en_US
dcterms.issued2017-
dc.identifier.scopus2-s2.0-85046493730-
dc.relation.conferenceIEEE Conference on Global Communications [GLOBECOM]-
dc.identifier.artn8253981en_US
dc.description.validate202402 bcch-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberCOMP-1202-
dc.description.fundingSourceOthersen_US
dc.description.fundingTextPolyUen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS25067650-
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Conference Paper
Files in This Item:
File Description SizeFormat 
Dou_Access_Pattern_Hidden.pdfPre-Published version1.17 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

34
Citations as of May 12, 2024

Downloads

23
Citations as of May 12, 2024

SCOPUSTM   
Citations

1
Citations as of May 17, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.