Cryptographic Techniques for Data Processing
Document Type
Conference Proceeding
Publication Date
1-8-2022
Abstract
This tutorial focuses on two principal lines of research aimed to provide secure data processing cloud-based data outsourcing - encryption and secret-sharing-based approaches that have been developed over the last two decades. The tutorial compares these techniques based on efficiency and information leakage. We discuss that existing cryptographic techniques are not sufficient alone to achieve the goal of efficient as well as secure data processing. To overcome the limitation of efficient and secure data processing, a new line of work that combines software and hardware mechanisms is required. We discuss an orthogonal approach designed around the concept of data partitioning, i.e., splitting the data processing into cryptographically secure and non-secure parts. Finally, we will discuss some open questions in designing secure cryptographic techniques that can process large-sized data efficiently.
Identifier
85122702001 (Scopus)
ISBN
[9781450385824]
Publication Title
ACM International Conference Proceeding Series
External Full Text Location
https://doi.org/10.1145/3493700.3493771
First Page
344
Last Page
347
Recommended Citation
Sharma, Shantanu and Mehrotra, Sharad, "Cryptographic Techniques for Data Processing" (2022). Faculty Publications. 3180.
https://digitalcommons.njit.edu/fac_pubs/3180