Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Insynd: Improved Privacy-Preserving Transparency Logging
Katholieke Universiteit Leuven, Leuven, Belgium. (ESAT/COSIC & iMinds)
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). (PriSec)ORCID iD: 0000-0001-6459-8409
2016 (English)In: Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II / [ed] Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas,Catherine Meadows, Cham: Springer, 2016, Vol. 9879, p. 121-139Conference paper, Published paper (Refereed)
Abstract [en]

Service providers collect and process more user data then ever, while users of these services remain oblivious to the actual processing and utility of the processed data to the service providers. This leads users to put less trust in service providers and be more reluctant to share data. Transparency logging is about service providers continuously logging descriptions of the data processing on their users' data, where each description is intended for a particular user.

We propose Insynd, a new cryptographic scheme for privacy-preserving transparency logging. Insynd improves on prior work by (1) increasing the utility of all data sent through the scheme thanks to our publicly verifiable proofs: one can disclose selected events without having to disclose any long term secrets; and (2) enabling a stronger adversarial model: Inysnd can deal with an untrusted server (such as commodity cloud services) through the use of an authenticated data structure named Balloon. Finally, our publicly available prototype implementation shows greatly improved performance with respect to related work and competitive performance for more data-intensive settings like secure logging.

Place, publisher, year, edition, pages
Cham: Springer, 2016. Vol. 9879, p. 121-139
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 9879
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-46375DOI: 10.1007/978-3-319-45741-3_7ISI: 000387954500007ISBN: 978-3-319-45740-6 (print)OAI: oai:DiVA.org:kau-46375DiVA, id: diva2:1010232
Conference
ESORICS 2016 - The 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016
Projects
HITSA4CloudAvailable from: 2016-10-03 Created: 2016-10-03 Last updated: 2019-11-11Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Pulls, Tobias

Search in DiVA

By author/editor
Pulls, Tobias
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 343 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf