7,756 Hits in 4.9 sec

A Differentially Private Index for Range Query Processing in Clouds

Cetin Sahin, Tristan Allard, Reza Akbarinia, Amr El Abbadi, Esther Pacitti
2018 2018 IEEE 34th International Conference on Data Engineering (ICDE)  
This paper proposes constructing a differentially private index to an outsourced encrypted dataset. Efficiency is enabled by using a cleartext index structure to perform range queries.  ...  Compared to state-ofthe-art secure index based range query processing approaches, PINED-RQ executes queries in the order of at least one magnitude faster.  ...  To the best of our knowledge, PINED-RQ is the first work that builds, uses and maintains a differentially private index for performing selection range queries.  ... 
doi:10.1109/icde.2018.00082 dblp:conf/icde/SahinAAAP18 fatcat:ghkkpg3r4vbyrayte7ykb7igna

Security and privacy in big data

Yang Xiang, Man Ho Au, Miroslaw Kutylowsky
2016 Concurrency and Computation  
Generally, big data is processed and queried on the cloud computing platform.  ...  Cloud computing, the new term for the long dreamed vision of computing as a utility, enables convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly  ...  So  will be ε-differentially private for all databases with k 2 .  ... 
doi:10.1002/cpe.3796 fatcat:n4kx5y34f5hzhn3us52ug7dwci

Secure Range Query Processing over Untrustworthy Cloud Services

Theodoros Tzouramanis
2017 Proceedings of the 21st International Database Engineering & Applications Symposium on - IDEAS 2017  
Privacy is a major concern in cloud computing since clouds are considered as untrusted environments. In this study, we address the problem of privacy-preserving range query processing on clouds.  ...  In this case, a system often confronts a high rate of incoming data. Prior schemes may thus suffer from potential performance issues, e.g., overload or bottleneck.  ...  [15] present PINED-RQ for serving efficient range query processing in clouds via secure indexes. Nonetheless, the high rate of new data is not discussed in this work.  ... 
doi:10.1145/3105831.3105872 dblp:conf/ideas/Tzouramanis17 fatcat:fmshxgdvvja3rglzdbesg236za

Enforcing Privacy in Cloud Databases [article]

Somayeh Sobati Moghadam, Gérald Gavin
2017 arXiv   pre-print
aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges.  ...  ., resorting to Database-as-a-Service (DBaaS), is nowadays a popular choice due to the elasticity, availability, scalability and pay-as-you-go features of cloud computing.  ...  Wang et al. propose a framework for secure and efficient query processing of relational data in the cloud that allows exact match and range queries, as well as updates [71] .  ... 
arXiv:1708.09171v1 fatcat:stvwiwy3b5bo5gdxmxcv3w46pm

A Range Query Algorithm to Process KNN Queries in Cloud Computing

S Selva
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
This method is used to building a practical query services in the Cloud.  ...  This approach will balance all the requirements by using range query and KNN query services.It provides multifaceted distances , which allows actual listing techniques to increase distances processing.  ...  The usage of pointer indicator i. e, index in this processing provides an efficient and fast way to deal with processing of queries. It shows the query result based on the inner range query.  ... 
doi:10.17762/ijritcc2321-8169.1503114 fatcat:pj6acdjusre6demwnxpbofga7e

Efficient, Consistent and Secure Global-Scale Data Management

Amr El Abbadi
2018 International Conference on Big Data and Cyber-Security Intelligence  
PinedRQ is a differentially private index for outsourced encrypted dataset and that supports non-aggregate range queries on cloud stored data, while achieving both privacy and efficiency.  ...  Performing range queries efficiently in an untrusted cloud setting has not been addressed in a satisfactory manner. Range queries express a bounded restriction over the retrieved records.  ... 
dblp:conf/bdcsintell/Abbadi18 fatcat:3zsnqq7wjfgj7iw4wpheof7wsu

A Review Based on Order Preserving Encryption-Scheme to Preserve the Order of Encrypted Cloud Data Search

2017 International Journal of Recent Trends in Engineering and Research  
The data on Cloud computing is encrypted due to security concern or the factor of third party to excavate into it. As the consequence to this, the search over encrypted data becomes a complex task.  ...  Even though with good security of one-to-many OPE the Cloud can get the information of the plain text if differential attacks occurred on the cipher text by calculating the differences between the cipher  ...  That is, a remote untrusted database server is able to index the (sensitive) data it receives, in encrypted form, in a data structure that permits efficient range queries i.e. asking the server to return  ... 
doi:10.23883/ijrter.2017.3169.js6dv fatcat:hrxcynalsrdt7kohd4jfsjflte

Privacy-preserving biomedical data dissemination via a hybrid approach

Yichen Jiang, Chenghong Wang, Zhixuan Wu, Xin Du, Shuang Wang
2018 AMIA Annual Symposium Proceedings  
In this paper, we propose a novel hybrid solution to combine two rigorous theoretical models (homomorphic encryption and differential privacy) for securely generating synthetic V-optimal histograms over  ...  Previous solutions show promise on securely generating histogram via differential privacy, however such methods only consider a centralized solution and the accuracy is still a limitation for real world  ...  While for private k priv , it will be kept in the storage space of TTP which is then used for facilitating the interactive HME process and decrypting the final differentially private histogram.  ... 
pmid:30815160 pmcid:PMC6371369 fatcat:p3unzo3mg5bcjn46pz6f6ekpli

Review on Multi-User Multi-Keyword Privacy Preserving Ranked Based Search Over Encrypted Cloud Data

2017 International Journal of Recent Trends in Engineering and Research  
for such a secure cloud data utilization system to become a reality.  ...  Considering the large number of data users and documents in cloud, it is crucial for the search service to allow multi-keyword query and provide result similarity ranking to meet the effective data retrieval  ...  Such a service should aim to achieve the "best of both worlds" by providing the security of a private cloud and the functionality and cost savings of a public cloud.  ... 
doi:10.23883/ijrter.2017.3158.7f3gy fatcat:d7c7gmoy75fqtcsxtdctsxekxe

OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain

Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, Wajahat Ali Khan, Kim-Kwang Raymond Choo
2017 PLoS ONE  
In this paper we propose Oblivious Similarity based Search (OS2) for encrypted data.  ...  The efficacy of OS2 is evaluated on Google App Engine for various bloom filter lengths on different cloud configurations.  ...  Acknowledgments This work was supported by a grant from Kyung Hee University in 2017 (KHU-20170427). Part of this research was also supported by Zayed University Research Cluster Award (R16086).  ... 
doi:10.1371/journal.pone.0179720 pmid:28692697 pmcid:PMC5503255 fatcat:fumxu4oacvfhtnmcygbwka6ijm

Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords

Ping Zhang, Jianzhong Wang
2015 Journal of Computer and Communications  
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this  ...  System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained.  ...  Acknowledgements In this paper, the research was sponsored by the Department of Education Project of Sichuan Province.  ... 
doi:10.4236/jcc.2015.39010 fatcat:oojajqxk35eeziwdbqpe47xiui

Mobile Privacy-Preserving Crowdsourced Data Collection in the Smart City [article]

Joshua Joy, Ciaran McGoldrick, Mario Gerla
2016 arXiv   pre-print
There are many different metaphors for providing end-to-end security for data exchanges, but they commonly require a management and control sidechannel.  ...  Clearly these different entities must co-operate and interoperate in a timely fashion when routing and transferring the highly dynamic data.  ...  Each data owner's answer is in the form of a '1' or '0' per index, depending on whether or not the answer falls within that range.  ... 
arXiv:1607.02805v1 fatcat:pvwb76e5ifb7za5f7nchorm4ga

PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid

Mi Wen, Rongxing Lu, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Xuemin Shen
2013 IEEE Transactions on Emerging Topics in Computing  
In this paper, we propose a novel privacy-preserving range query (PaRQ) scheme over encrypted metering data to address the privacy issues in financial auditing for smart grid.  ...  Our PaRQ allows a residential user to store metering data on a cloud server in an encrypted form.  ...  He is the co-author or editor of six books, and has published more than 600 papers, and book chapters in wireless communications and networks, control, and filtering.  ... 
doi:10.1109/tetc.2013.2273889 fatcat:53p5t36s2zer7pnq4w4zat5qva

Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud

Hongli Zhang, Zhigang Zhou, Lin Ye, Xiaojiang Du
2018 IEEE Transactions on Cloud Computing  
Storage as a service has become an important paradigm in cloud computing for its great flexibility and economic savings.  ...  On data querying phase, we adopt interactive differential privacy strategy to resist privacy breaches from statistical queries.  ...  In data querying phase, public cloud receives data query tasks sent from private cloud, and returns query results to private cloud.  Authorized users.  ... 
doi:10.1109/tcc.2015.2430316 fatcat:vskmge3uprcx7pb3lkpq2f7lga

Privacy-Preserving Ranked Search on Public-Key Encrypted Data

Sahin Buyrukbilen, Spiridon Bakiras
2013 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing  
Our solution employs a simple indexing structure, and leverages homomorphic encryption and private information retrieval (PIR) protocols to process queries in a privacy-preserving manner.  ...  While popular cloud computing platforms provide flexible and inexpensive solutions, they do so with minimal support for data security and privacy.  ...  Figure 7 plots the processing time at the cloud provider for updating the index, as a function of M .  ... 
doi:10.1109/hpcc.and.euc.2013.33 dblp:conf/hpcc/BuyrukbilenB13 fatcat:wp3v4fykvneunjg5ga2to6odru
« Previous Showing results 1 — 15 out of 7,756 results