Skip to main content

Computing on Encrypted Character Strings in Clouds

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7753))

Abstract

Many organizations today are turning towards the contemporary concept of Cloud Computing, which entails the transfer of their applications (processing both sensitive and non-sensitive data) into online repositories or clouds. Encryption schemes based on homomorphic functions can provide the technology required to protect the confidentiality of this data. Their limitation, however, lies in their ability to process numeric values only. This paper, therefore, is focused on proposing a new encryption scheme relying on character string splitting and ciphering with additional components on the user and cloud side to support querying and modifying character string functions. Ultimately, what eventuates is an environment where a cloud is unaware of the contents of any input character strings, and of the output data during processing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buchmann, J.: Introduction to Cryptography, 2nd edn. Springer, New York (2004)

    Book  Google Scholar 

  2. Camenisch, J., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 196–214. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Gentry, C.: A fully homomorphic encryption scheme. PhD thesis, Stanford University (2009), http://crypto.stanford.edu/craig

  4. Goluch, S.: The development of homomorphic cryptography – From RSA to Gentry’s privacy homomorphism. Master thesis, Vienna University of Technology (2011), http://www.ub.tuwien.ac.at/dipl/2011/AC07811660.pdf

  5. International Telecommunication Union: E.164 – The international public telecommunication numbering plan, http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-E.164-201011-IPDF-E&type=items

  6. Java Platform, Standard Edition 7 API Specification, http://docs.oracle.com/javase/7/docs/api

  7. Kotapati, K., Liu, P., LaPorta, T.: EndSec – An End-to-End Message Security Protocol for Mobile Telecommunication Networks. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–7 (2008)

    Google Scholar 

  8. Liu, L., Gai, J.: Bloom Filter Based Index for Query over Encrypted Character Strings in Database. In: World Congress on Computer Science and Information Engineering, pp. 303–307 (2009)

    Google Scholar 

  9. Liu, L., Gai, J.: A Method of Query over Encrypted Data in Database. In: International Conference on Computer Engineering and Technology, pp. 23–27 (2009)

    Google Scholar 

  10. MySQL 5.5 Reference Manual, http://downloads.mysql.com/docs/refman-5.5-en.a4.pdf

  11. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  12. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656–715 (1949), http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf

    MathSciNet  MATH  Google Scholar 

  13. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  14. Wang, Z.-F., Dai, J., Wang, W., Shi, B.-L.: Fast Query Over Encrypted Character Data in Database. Communications In Information and Systems 4(4), 289–300 (2004)

    MATH  Google Scholar 

  15. Wang, Z.-F., Wang, W., Shi, B.-L.: Storage and Query over Encrypted Character and Numerical Data in Database. In: The Fifth International Conference on Computer and Information Technology, Shanghai, pp. 591–595 (2005)

    Google Scholar 

  16. Zhu, H., Cheng, J., Jin, R.: Executing Query over Encrypted Character Strings in Databases. Frontier of Computer Science and Technology, pp. 90–97 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fahrnberger, G. (2013). Computing on Encrypted Character Strings in Clouds. In: Hota, C., Srimani, P.K. (eds) Distributed Computing and Internet Technology. ICDCIT 2013. Lecture Notes in Computer Science, vol 7753. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36071-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36071-8_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36070-1

  • Online ISBN: 978-3-642-36071-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics