Project Details
Description
Key-value (KV for short) store is one of the most popular types of data storage for big data in the cloud. For the concern of data security and privacy, many organizations encrypt their data and outsource the data to the cloud. As the data size ever increasing, it is also important to compress the data stored in the cloud. However, it is a challenging task to combine data encryption with compression. The principal goal of this project is to develop an efficient and secure scheme to compress and encrypt the KV stores outsourced to the cloud. There are three tasks of this project: 1) Develop a mathematical model for analysis of storage cost and bandwidth cost in a KV store with data compression and encryption, and determine the optimal pack size for compression to achieve the best trade-off between storage and bandwidth costs. 2) Design an encrypted and compressed KV store that achieves frequency-security and length-security efficiently. The system shall be secure that it hides access frequencies and lengths of KV pairs and shall be efficient that it incurs minimal bandwidth and storage overheads to achieve the specified security requirements. 3) Design the algorithms for the dynamic management of the KV system. It includes the support of insert/delete operations of KV pairs and the dynamic adaptation of the proposed security scheme under the change of access frequencies of KV pairs.
| Project number | 9043341 |
|---|---|
| Grant type | GRF |
| Status | Active |
| Effective start/end date | 1/01/23 → … |
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
Research output
-
Access-Pattern Hiding Search over Encrypted Databases by Using Distributed Point Functions
Xie, H., Guo, Y., Miao, Y. & Jia, X., Mar 2025, In: IEEE Transactions on Computers. 74, 3, p. 1066-1078 13 p.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
4 Link opens in a new tab Citations (Scopus) -
Assessing Embedding Capability of Arrangement Graphs From the Perspectives of Partitioned Edge Faults
Zhuang, H., Guo, C., Liu, H., Li, X.-Y. & Jia, X., Dec 2025, In: IEEE Transactions on Reliability. 74, 4, p. 5753-5764 12 p.Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
1 Link opens in a new tab Citation (Scopus) -
CAT: Contrastive Adversarial Training for Evaluating the Robustness of Protective Perturbations in Latent Diffusion Models
Peng, S., Wang, M., He, J., Yang, J. & Jia, X., Jul 2025, Proceedings of the 42nd International Conference on Machine Learning. Singh, A., Fazel, M., Hsu, D., Lacoste-Julien, S., Berkenkamp, F., Maharaj, T., Wagstaff, K. & Zhu, J. (eds.). ML Research Press, p. 48872-48885 14 p. (Proceedings of Machine Learning Research; vol. 267).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Open Access