Abstract
Many organizations today are turning towards the contemporary concept of Cloud Computing, which entails the transfer of their applications (processing both sensitive and non-sensitive data) into online repositories or clouds. Encryption schemes based on homomorphic functions can provide the technology required to protect the confidentiality of this data. Their limitation, however, lies in their ability to process numeric values only. This paper, therefore, is focused on proposing a new encryption scheme relying on character string splitting and ciphering with additional components on the user and cloud side to support querying and modifying character string functions. Ultimately, what eventuates is an environment where a cloud is unaware of the contents of any input character strings, and of the output data during processing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Buchmann, J.: Introduction to Cryptography, 2nd edn. Springer, New York (2004)
Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196–214. Springer, Heidelberg (2009)
Gentry, C.: A fully homomorphic encryption scheme. PhD thesis, Stanford University (2009), http://crypto.stanford.edu/craig
Goluch, S.: The development of homomorphic cryptography – From RSA to Gentry’s privacy homomorphism. Master thesis, Vienna University of Technology (2011), http://www.ub.tuwien.ac.at/dipl/2011/AC07811660.pdf
International Telecommunication Union: E.164 – The international public telecommunication numbering plan, http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-E.164-201011-IPDF-E&type=items
Java Platform, Standard Edition 7 API Specification, http://docs.oracle.com/javase/7/docs/api
Kotapati, K., Liu, P., LaPorta, T.: EndSec – An End-to-End Message Security Protocol for Mobile Telecommunication Networks. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–7 (2008)
Liu, L., Gai, J.: Bloom Filter Based Index for Query over Encrypted Character Strings in Database. In: World Congress on Computer Science and Information Engineering, pp. 303–307 (2009)
Liu, L., Gai, J.: A Method of Query over Encrypted Data in Database. In: International Conference on Computer Engineering and Technology, pp. 23–27 (2009)
MySQL 5.5 Reference Manual, http://downloads.mysql.com/docs/refman-5.5-en.a4.pdf
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656–715 (1949), http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Wang, Z.-F., Dai, J., Wang, W., Shi, B.-L.: Fast Query Over Encrypted Character Data in Database. Communications In Information and Systems 4(4), 289–300 (2004)
Wang, Z.-F., Wang, W., Shi, B.-L.: Storage and Query over Encrypted Character and Numerical Data in Database. In: The Fifth International Conference on Computer and Information Technology, Shanghai, pp. 591–595 (2005)
Zhu, H., Cheng, J., Jin, R.: Executing Query over Encrypted Character Strings in Databases. Frontier of Computer Science and Technology, pp. 90–97 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fahrnberger, G. (2013). Computing on Encrypted Character Strings in Clouds. In: Hota, C., Srimani, P.K. (eds) Distributed Computing and Internet Technology. ICDCIT 2013. Lecture Notes in Computer Science, vol 7753. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36071-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-36071-8_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36070-1
Online ISBN: 978-3-642-36071-8
eBook Packages: Computer ScienceComputer Science (R0)