Private Information Retrieval Based on the Subgroup Membership Problem
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A survey of single-database private information retrieval: techniques and applications
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
On the integration of public key data encryption and public key encryption with keyword search
ISC'06 Proceedings of the 9th international conference on Information Security
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Privacy-preserving set operations
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
A privacy-preserving secure service discovery protocol for ubiquitous computing environments
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Hi-index | 0.00 |
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the public servers are not under the control of users, there concerns on the privacy on the users data stored in the servers, which hinders the applications of public data sharing. Although some services, like Yahoo Briefcase, require passwords for data requests, this mechanism is designed to protect the privacy of users' data against malicious outsider users rather than untrusted public servers. Hence, a new approach is needed to protect users' data privacy in public data sharing applications when servers are not trusted. In this paper, an approach to controlled privacy preserving keyword search is presented to safeguard the privacy of users' data and queries in data sharing applications through public servers. With our approach, 1) users could store and share information with other users without worrying about the servers to compromise their privacies, 2) users can control both the access and the keyword search capability to their data without relying on the servers, and 3) all data requests are well protected from malicious users and the servers.