2014 IEEE High Performance Extreme Computing Conference (HPEC) 2014
DOI: 10.1109/hpec.2014.7040943
|View full text |Cite
|
Sign up to set email alerts
|

A survey of cryptographic approaches to securing big-data analytics in the cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
4
2

Relationship

3
7

Authors

Journals

citations
Cited by 53 publications
(24 citation statements)
references
References 10 publications
0
24
0
Order By: Relevance
“…The other approach is described in [22], where the authors provide a client-side library that provides cryptographic protections for Accumulo data. In [26], the authors describe other methods for securing data that can be applied to this work. i) Enhancements: While the ingest performance currently meets the needs for a single node producing LPM events under an I/O intensive workload, one area of future work will explore ways to increase the ingest performance such that a single node can support multiple clients at once.…”
Section: Discussionmentioning
confidence: 99%
“…The other approach is described in [22], where the authors provide a client-side library that provides cryptographic protections for Accumulo data. In [26], the authors describe other methods for securing data that can be applied to this work. i) Enhancements: While the ingest performance currently meets the needs for a single node producing LPM events under an I/O intensive workload, one area of future work will explore ways to increase the ingest performance such that a single node can support multiple clients at once.…”
Section: Discussionmentioning
confidence: 99%
“…A few cryptography-based approaches, such as homomorphic encryption (HE), verifiable computation (VC), and secure multi-party computation (MPC) have been designed in order to provide secure big-data processing in the Cloud [17]. However, other approaches, such as Asymmetric Key Cryptography and trusted Public Key Infrastructure have been developed over the years in order to support privacy preservation in the spatio-temporal domain.…”
Section: Levelmentioning
confidence: 99%
“…Prior work has looked at various techniques to improve the confidentiality, integrity and availability of big data systems and an overview is provided in [4]. There are many existing cryptographic tools capable of performing some level of computation on encrypted data.…”
Section: Introductionmentioning
confidence: 99%