SEARCHABLE ENCRYPTION FOR OUTSOURCING DATA ANALYTICS
First Claim
1. A method for performing data analytics on outsourced data, the method comprising:
- generating, by a data owner, a binary tree representing data from the data owner, wherein each node of the binary tree is associated with an identity that represents a data element or an interval of data elements;
computing, by the data owner, an identity token and encrypting the identity token for each of the identities in the binary tree;
generating a range query token using an identity selected by a data analyst and a secret key input by the data owner and computing a decryption key for the selected identity; and
analyzing the data, by the data analyst, by comparing the computed decryption key for the selected identity with each of the encrypted identities.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for performing data analytics on outsourced data may include generating, by a data owner, a binary tree representing data from the data owner, where each node of the binary tree is associated with an identity that represents a data element or an interval of data elements, computing, by the data owner, an identity token and encrypting the identity token for each of the identities in the binary tree, generating a range query token using an identity selected by a data analyst and a secret key input by the data owner and computing a decryption key for the selected identity, and analyzing the data, by the data analyst, by comparing the computed decryption key for the selected identity with each of the encrypted identities.
-
Citations
20 Claims
-
1. A method for performing data analytics on outsourced data, the method comprising:
-
generating, by a data owner, a binary tree representing data from the data owner, wherein each node of the binary tree is associated with an identity that represents a data element or an interval of data elements; computing, by the data owner, an identity token and encrypting the identity token for each of the identities in the binary tree; generating a range query token using an identity selected by a data analyst and a secret key input by the data owner and computing a decryption key for the selected identity; and analyzing the data, by the data analyst, by comparing the computed decryption key for the selected identity with each of the encrypted identities. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for performing data analytics on outsourced data, comprising:
-
a key generator that is arranged and configured to generate a binary tree representing data from a data owner, wherein each node of the binary tree is associated with an identity that represents a data element or an interval of data elements; an encryption generator that is arranged and configured to compute an identity token and encrypt the identity token for each of the identities in the binary tree; a query generator that is arranged and configured to generate a range query token using an identity selected by a data analyst and a secret key input by the data owner and computing a decryption key for the selected identity; and an analysis engine that is arranged and configured to analyzing the data by comparing the computed decryption key for the selected identity with each of the encrypted identities. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program product for performing data analytics on outsourced data, the computer program product being tangibly embodied on a computer-readable medium and including executable code that, when executed, is configured to cause a data processing apparatus to:
-
generate a binary tree representing data from a data owner, wherein each node of the binary tree is associated with an identity that represents a data element or an interval of data elements; compute an identity token and encrypting the identity token for each of the identities in the binary tree; generate a range query token using an identity selected by a data analyst and a secret key input by the data owner and compute a decryption key for the selected identity; and analyze the data by comparing the computed decryption key for the selected identity with each of the encrypted identities. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. The computer program product of 17 further comprising executable code that, when executed, causes the data processing engine to analyze the data using the outputted identity query tokens.
Specification