Sciweavers

SEC
2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing

13 years 5 months ago
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing
Data outsourcing is emerging today as a successful solution for organizations looking for a cost-effective way to make their data available for on-line querying. To protect outsourced data from unauthorized accesses, even from the (honest but curious) host server, data are encrypted and indexes associated with them enable the server to execute queries without the need of accessing cleartext. Current solutions consider the whole database as encrypted with a single key known only to the data owner, which therefore has to be kept involved in the query execution process. In this paper, we propose different multi-key data encryption strategies for enforcing access privileges. Our strategies exploit different keys, which are distributed to the users, corresponding to the different authorizations. We then present some experiments evaluating the quality of the proposed strategies with respect to the amount of cryptographic information to be produced and maintained.
Ernesto Damiani, Sabrina De Capitani di Vimercati,
Added 30 Oct 2010
Updated 30 Oct 2010
Type Conference
Year 2007
Where SEC
Authors Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Comments (0)