このアイテムのアクセス数: 179

このアイテムのファイル:
ファイル 記述 サイズフォーマット 
icdim2011.pdf192.88 kBAdobe PDF見る/開く
完全メタデータレコード
DCフィールド言語
dc.contributor.authorKawamoto, Junpeija
dc.contributor.authorYoshikawa, Masatoshija
dc.contributor.alternative川本, 淳平ja
dc.contributor.alternative吉川, 正俊ja
dc.date.accessioned2011-10-14T08:07:27Z-
dc.date.available2011-10-14T08:07:27Z-
dc.date.issued2011-09ja
dc.identifier.urihttp://hdl.handle.net/2433/147946-
dc.description2011 Sixth International Conference on Digital Information Management (ICDIM) : Melbourne, Australia, September, 2011.09.26-2011.09.28ja
dc.description.abstractIn this paper, we propose a novel approach for private query; IPP (inner product predicate) method. Private query is a query processing protocol to obtain requesting tuples without exposing any information about what users request to third persons including service providers. Existing works about private query such as PIR, which ensure information theoretic safety, have severe restriction because they do not support range queries nor allow tuples having a same value in queried attributes. Our IPP method, on the other hands, focuses range queries mainly and it allows tuples having a same value in any attributes. IPP method employs a query transform by trusted clients (QT) scheme and proposes transformation algorithms which make the correlation between plain queries and transformed queries and the correlation between plain attribute values and transformed attribute values small enough. Thus, the transformed queries and attribute values have resistance to frequency analysis attacks which implies IPP method prevents attackers, who know the plain distribution of them, from computing the plain queries and attribute values from transformed values. IPP method adds perturbations to queries and attribute values and gives them a matrix based encryption to achieve the above property. We also confirm the computational cost on servers belongs to O(n) with the number of tuples n and is virtually no orrelation between the distributions of transformed queries and queried attribute values and the plain distributions of them by experimental evaluations.ja
dc.format.mimetypeapplication/pdfja
dc.language.isoengja
dc.publisherIEEEja
dc.rights(c) 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted.ja
dc.rightsThis is not the published version. Please cite only the published version. この論文は出版社版でありません。引用の際には出版社版をご確認ご利用ください。ja
dc.subjectCorrelationja
dc.subjectEncryptionja
dc.subjectQuery processingja
dc.subjectServersja
dc.subjectVectorsja
dc.subjectcryptographyja
dc.subjectdatabase management systemsja
dc.subjectmatrix algebraja
dc.subjectquery processingja
dc.titlePrivate Range Query by Perturbation and Matrix Based Encryptionja
dc.identifier.urlhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6093317ja
dc.type.niitypeJournal Articleja
dc.identifier.jtitle2011 Sixth International Conference on Digital Information Management (ICDIM)ja
dc.identifier.spage211ja
dc.identifier.epage216ja
dc.relation.doi10.1109/ICDIM.2011.6093317ja
dc.textversionauthorja
dc.relation.urlhttp://www.icdim.org/bpaper.phpja
出現コレクション:学術雑誌掲載論文等

アイテムの簡略レコードを表示する

Export to RefWorks


出力フォーマット 


このリポジトリに保管されているアイテムはすべて著作権により保護されています。