SEARCHABLE ENCRYPTION FOR OUTSOURCING DATA ANALYTICS
First Claim
Patent Images
1. A method for performing data analytics on outsourced data, the method comprising:
- receiving, at a data analyst, cipher text representing data from a data owner such that the data remains hidden from the data analyst;
generating a query token using a constant provided by the data analyst such that the constant remains hidden from the data owner; and
analyzing the cipher text using the query token.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for performing data analytics on outsourced data may include receiving, at a data analyst, cipher text representing data from a data owner such that the data remains hidden from the data analyst, generating a query token using a constant provided by the data analyst such that the constant remains hidden from the data owner, and analyzing the cipher text using the query token.
61 Citations
20 Claims
-
1. A method for performing data analytics on outsourced data, the method comprising:
-
receiving, at a data analyst, cipher text representing data from a data owner such that the data remains hidden from the data analyst; generating a query token using a constant provided by the data analyst such that the constant remains hidden from the data owner; and analyzing the cipher text using the query token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for performing data analytics on outsourced data, comprising:
-
an encryption generator that is arranged and configured to encrypt data from a data owner, output a cipher text and communicate the cipher text to a data analyst such that the data remains hidden from the data analyst; a query generator that is arranged and configured to generate a query token using a constant provided by the data analyst such that the constant remains hidden from the data owner; and an analysis engine that is arranged and configured to analyze the cipher text using the query token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for performing data analytics on outsourced data, the computer program product being tangibly embodied on a computer-readable medium and including executable code that, when executed, is configured to cause a data processing apparatus to:
-
encrypt data from a data owner, output a cipher text and communicate the cipher text to a data analyst such that the data remains hidden from the data analyst; generate a query token using a constant provided by the data analyst such that the constant remains hidden from the data owner; and analyze the cipher text using the query token. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification