Statistics on Encrypted Cloud Data

  • Fu-Kuo Tseng
  • Yung-Hsiang Liu
  • Rong-Jaye Chen
  • Bao-Shuh Paul Lin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8231)


As an increasing number of data is to be processed, outsourcing data to the cloud environment becomes an appealing proposal to heighten the computation/storage efficiency, while avoiding costly and complicated system construction. However, it is necessary to encrypt the outsourced data to prevent the breaches of both data confidentiality and privacy. Most of the statistical procedures deal with the data in the cleartext form, making it hard to directly apply them to the data in the encrypted form. In this paper, we present a statistical framework to securely and efficiently obtain the statistics on encrypted cloud data through real-time processing. We build our framework on top of the searchable public-key encryption and provide detailed transformation of the statistical procedures for the plain data to those for the encrypted data. We provide detailed descriptions and examples of these transformed statistical procedures. Finally, we provide security analysis and performance evaluation of these transformed procedures and demonstrate the effectiveness and efficiency of the proposed framework.


statistics encrypted cloud data efficient transformation of statistical procedures statistical framework online storage services 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mell, P., Grance, T.: The nist definition of cloud computing (draft). NIST special publication 800-145 (2011)Google Scholar
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  3. 3.
    Subashini, S., Kavitha, V.: Review: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRefGoogle Scholar
  4. 4.
    Virvilis, N., Dritsas, S., Gritzalis, D.: Secure cloud storage: Available infrastructures and architectures review and evaluation. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 74–85. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  5. 5.
    NIST: Fips pub 197: Announcing the advanced encryption standard (aes). NIST (2001)Google Scholar
  6. 6.
    Jonsson, J., Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (3) (February 2003)Google Scholar
  7. 7.
    Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420–443. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  8. 8.
    Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  11. 11.
    Lapin, L.L.: Probability and statistics for modern engineering (1990)Google Scholar
  12. 12.
    Barnes, J.: Statistical analysis for engineers and scientists: a computer-based approach. McGraw-Hill, Inc. (1994)Google Scholar
  13. 13.
    Walpole, R.E., Myers, R.H., Myers, S.L., Ye, K.: Probability and statistics for engineers and scientists, vol. 8. Prentice Hall, Upper Saddle River (1993)Google Scholar
  14. 14.
    Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS 1997, pp. 364–373. IEEE Computer Society, Washington, DC (1997)CrossRefGoogle Scholar
  15. 15.
    Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Rabin, M.O.: How to exchange secrets with oblivious transferGoogle Scholar
  17. 17.
    Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD 2000, pp. 439–450. ACM, New York (2000)CrossRefGoogle Scholar
  19. 19.
    Goh, E.J.: Secure indexes. IACR Cryptology ePrint Archive (2003)Google Scholar
  20. 20.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 79–88. ACM, New York (2006)CrossRefGoogle Scholar
  21. 21.
    Tseng, F.K., Chen, R.J., Lin, B.S.P.: Toward authenticated and complete query results from cloud storages. In: 2013 IEEE 12th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 452–458 (July 2013)Google Scholar
  22. 22.
    Iovino, V., Persiano, G.: Hidden-vector encryption with groups of prime order. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 75–88. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  23. 23.
    Tseng, F.K., Liu, Y.H., Chen, R.J.: Toward authenticated and complete query results from cloud storages. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1204–1209 (June 2012)Google Scholar
  24. 24.
    Tseng, F.K., Liu, Y.H., Chen, R.J.: Ensuring correctness of range searches on encrypted cloud data. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 570–573 (2012)Google Scholar
  25. 25.
    Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344–371. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  26. 26.
    Blundo, C., Iovino, V., Persiano, G.: Private-key hidden vector encryption with key confidentiality. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 259–277. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  27. 27.
    National Chiao-Tung University: NCTU Openstack Dashboard (2013),
  28. 28.
    Free Software Foundation, Inc.: GMP: The GNU Multiple Precision Arithmetic Library (2006)
  29. 29.
    Lynn, B.: PBC: Pairing-Based Cryptography Library (2008),

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Fu-Kuo Tseng
    • 1
  • Yung-Hsiang Liu
    • 1
  • Rong-Jaye Chen
    • 1
  • Bao-Shuh Paul Lin
    • 1
  1. 1.National Chiao-Tung UniversityHsinchu CityTaiwan

Personalised recommendations