Fair Data Transactions Across Private Databases

被引:2
作者
Yuan, Wei [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Coll Math, Changchun 130012, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Protocols; Companies; Databases; Probabilistic logic; Commutative encryption; data transaction; data sharing; big data; homomorphic encryption;
D O I
10.1109/ACCESS.2020.2979813
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this era of big data, data transactions are becoming more frequent and bringing new benefits for both data buyers and providers. However, there are no data transaction schemes to satisfy the special security and business requirements of data transactions. In this paper, we introduce the requirements in practical data transaction processes and compare the differences of requirements and techniques between data transaction and traditional data sharing. Next, we propose and implement the first data transaction scheme based on a newly defined concept probabilistic commutative encryption, which makes the decryption order of a probabilistic encryption algorithm and a deterministic encryption algorithm commutative. Since the security concerns of both sides can be achieved in a malicious model, our scheme is fair to both data buyers and data providers from a business perspective. Furthermore, our scheme allows data transaction to be partly outsourced to a semi-honest cloud storage platform.
引用
收藏
页码:53720 / 53732
页数:13
相关论文
共 36 条
[1]  
Agrawal R, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[2]  
[Anonymous], 2012, ASIACCS
[3]  
[Anonymous], TR81
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[9]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[10]  
Brassard G., 1986, P C THEOR APPL CRYPT, P234