{"title":"Privacy-aware cloud-based input method editor","authors":"Junpei Kawamoto, K. Sakurai","doi":"10.1109/ICCCHINA.2014.7008273","DOIUrl":null,"url":null,"abstract":"Cloud services are useful but privacy concerns are the most important problems of them. In this paper, we focus cloud-based input method editors and introduce a privacy-aware framework of them. Input method editor (IME) is a kind of software to help us to input Japanese, Chinese, Korean, etc. It receives input words consists of alphabets and returns transformed words consists of Kanji in Japanese, etc. We assume to deploy this IME on a cloud server. In this case, input words received IME may include people's sensitive information e.g. credit card number. We employ a seachable encryption scheme and introduce a framework that people send encrypted inputs and IME computes transformed words without decrypting them.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCHINA.2014.7008273","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cloud services are useful but privacy concerns are the most important problems of them. In this paper, we focus cloud-based input method editors and introduce a privacy-aware framework of them. Input method editor (IME) is a kind of software to help us to input Japanese, Chinese, Korean, etc. It receives input words consists of alphabets and returns transformed words consists of Kanji in Japanese, etc. We assume to deploy this IME on a cloud server. In this case, input words received IME may include people's sensitive information e.g. credit card number. We employ a seachable encryption scheme and introduce a framework that people send encrypted inputs and IME computes transformed words without decrypting them.