Presentation 2016-03-03
Privacy-preserving Log Analysis with Deterministic Encryption
Yuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is necessary to provide a secure service in the network. In general, log information includes things to identify a user uniquely and is stored in databases as encrypted data. In this study, for these problems, we construct a privacy--preserving log analysis system, that even if log information is leaked, a third party cannot identify the personal information while an analyzer of log can analyze the data. We also evaluate performance of the system for logs provided in realistic environment. We note that the system has been constructed via deterministic encryption scheme without heavy primitives such as a homomorphic encryption scheme or a searchable symmetric encryption scheme.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Privacy-preserving Log Analysis / Encrypted Data Processing / Deterministic Encryption / AES
Paper # ICSS2015-54
Date of Issue 2016-02-25 (ICSS)

Conference Information
Committee ICSS / IPSJ-SPT
Conference Date 2016/3/3(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Academic Center for Computing and Media Studies, Kyoto University
Topics (in Japanese) (See Japanese page)
Topics (in English) Information and Communication System Security, etc.
Chair Yutaka Miyake(KDDI R&D Labs.)
Vice Chair Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.)
Secretary Takashi Nishide(Mitsubishi Electric) / Yoshiaki Shiraishi(NII)
Assistant Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT)

Paper Information
Registration To Technical Committee on Information and Communication System Security / Special Interest Group on Security Psychology and Trust
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Privacy-preserving Log Analysis with Deterministic Encryption
Sub Title (in English)
Keyword(1) Privacy-preserving Log Analysis
Keyword(2) Encrypted Data Processing
Keyword(3) Deterministic Encryption
Keyword(4) AES
1st Author's Name Yuji Furuta
1st Author's Affiliation Osaka University(Osaka Univ.)
2nd Author's Name Naoto Yanai
2nd Author's Affiliation Osaka University(Osaka Univ.)
3rd Author's Name Masashi Karasaki
3rd Author's Affiliation NTT-neomeit(NTT-neomeit)
4th Author's Name Katsuhiko Eguchi
4th Author's Affiliation NTT Neomeit Corporation(NTT Neomeit)
5th Author's Name Yasunori Ishihara
5th Author's Affiliation Osaka University(Osaka Univ.)
6th Author's Name Toru Fujiwara
6th Author's Affiliation Osaka University(Osaka Univ.)
Date 2016-03-03
Paper # ICSS2015-54
Volume (vol) vol.115
Number (no) ICSS-488
Page pp.pp.41-46(ICSS),
#Pages 6
Date of Issue 2016-02-25 (ICSS)