We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we introduce the notion of structured encryption which generalizes previous work on symmetric searchable encryption (SSE) to the setting of arbitrarily-structured data. In the context of cloud storage, structured encryption allows a client to encrypt data without losing the ability to query and retrieve it efficiently. Another application, which we introduce in this work, is to the problem of controlled disclosure, where a data owner wishes to grant access to only part of a massive dataset. We propose a model for structured encryption, a formal security definition an...
We present an approach where one can execute user defined SPARQL queries on encrypted graph data. Th...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
Outsourcing data storage is a topic of emerging importance in database security. In this paper, we ...
Database outsourcing is a challenge concerning data secrecy. Even if an adversary, including the ser...
University of Technology Sydney. Faculty of Engineering and Information Technology.Data outsourcing ...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
With the growing popularity of remote storage, the ability to outsource a large private database yet...
Abstract. Private query processing on encrypted databases allows users to obtain data from encrypted...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
Motivated by the problem of data breaches, we formalize a notion of security for dynamic structured ...
The current trend towards outsourcing data storage and management to the cloud has largely been driv...
The proliferation of cloud computing highlights the importance of techniques that permit both secure...
In this paper, we consider a setting where a client wants to outsource storage of a large amount of ...
Database outsourcing is a challenging task concerning data secrecy. Even if an adversary, including ...
Structured encryption (STE) schemes encrypt data structures in such a way that they can be privately...
We present an approach where one can execute user defined SPARQL queries on encrypted graph data. Th...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
Outsourcing data storage is a topic of emerging importance in database security. In this paper, we ...
Database outsourcing is a challenge concerning data secrecy. Even if an adversary, including the ser...
University of Technology Sydney. Faculty of Engineering and Information Technology.Data outsourcing ...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
With the growing popularity of remote storage, the ability to outsource a large private database yet...
Abstract. Private query processing on encrypted databases allows users to obtain data from encrypted...
As the Internet evolves, we find more applications that involve data originating from multiple sourc...
Motivated by the problem of data breaches, we formalize a notion of security for dynamic structured ...
The current trend towards outsourcing data storage and management to the cloud has largely been driv...
The proliferation of cloud computing highlights the importance of techniques that permit both secure...
In this paper, we consider a setting where a client wants to outsource storage of a large amount of ...
Database outsourcing is a challenging task concerning data secrecy. Even if an adversary, including ...
Structured encryption (STE) schemes encrypt data structures in such a way that they can be privately...
We present an approach where one can execute user defined SPARQL queries on encrypted graph data. Th...
We say that cryptographic schemes are "symmetric" whenever the sender and receiver share the same ke...
Outsourcing data storage is a topic of emerging importance in database security. In this paper, we ...