Presentation | 2016-03-03 Privacy-preserving Log Analysis with Deterministic Encryption Yuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is necessary to provide a secure service in the network. In general, log information includes things to identify a user uniquely and is stored in databases as encrypted data. In this study, for these problems, we construct a privacy--preserving log analysis system, that even if log information is leaked, a third party cannot identify the personal information while an analyzer of log can analyze the data. We also evaluate performance of the system for logs provided in realistic environment. We note that the system has been constructed via deterministic encryption scheme without heavy primitives such as a homomorphic encryption scheme or a searchable symmetric encryption scheme. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Privacy-preserving Log Analysis / Encrypted Data Processing / Deterministic Encryption / AES |
Paper # | ICSS2015-54 |
Date of Issue | 2016-02-25 (ICSS) |
Conference Information | |
Committee | ICSS / IPSJ-SPT |
---|---|
Conference Date | 2016/3/3(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Academic Center for Computing and Media Studies, Kyoto University |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Information and Communication System Security, etc. |
Chair | Yutaka Miyake(KDDI R&D Labs.) |
Vice Chair | Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.) |
Secretary | Takashi Nishide(Mitsubishi Electric) / Yoshiaki Shiraishi(NII) |
Assistant | Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) |
Paper Information | |
Registration To | Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Privacy-preserving Log Analysis with Deterministic Encryption |
Sub Title (in English) | |
Keyword(1) | Privacy-preserving Log Analysis |
Keyword(2) | Encrypted Data Processing |
Keyword(3) | Deterministic Encryption |
Keyword(4) | AES |
1st Author's Name | Yuji Furuta |
1st Author's Affiliation | Osaka University(Osaka Univ.) |
2nd Author's Name | Naoto Yanai |
2nd Author's Affiliation | Osaka University(Osaka Univ.) |
3rd Author's Name | Masashi Karasaki |
3rd Author's Affiliation | NTT-neomeit(NTT-neomeit) |
4th Author's Name | Katsuhiko Eguchi |
4th Author's Affiliation | NTT Neomeit Corporation(NTT Neomeit) |
5th Author's Name | Yasunori Ishihara |
5th Author's Affiliation | Osaka University(Osaka Univ.) |
6th Author's Name | Toru Fujiwara |
6th Author's Affiliation | Osaka University(Osaka Univ.) |
Date | 2016-03-03 |
Paper # | ICSS2015-54 |
Volume (vol) | vol.115 |
Number (no) | ICSS-488 |
Page | pp.pp.41-46(ICSS), |
#Pages | 6 |
Date of Issue | 2016-02-25 (ICSS) |