52,910 Hits in 4.4 sec

A Secure Search Engine for the Personal Cloud

Saliha Lallali, Nicolas Anciaux, Iulian Sandu Popa, Philippe Pucheral
2015 Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15  
This demonstration presents a Secure Personal Cloud Platform relying on a query and access control engine embedded in a tamper resistant hardware device connected to the user's platform.  ...  constraints of tamper-resistant devices and provide scalable solutions for the Personal Cloud.  ...  We consider that the search engine of interest in our context has a similar functionality as a Google desktop for secure tokens.  ... 
doi:10.1145/2723372.2735376 dblp:conf/sigmod/LallaliAPP15 fatcat:aebkt7eignhjbdlr3is2jy75xe

Secure Searching Encrypted Data over Cloud

Nikita Bharat Nerkar
2017 International Journal for Research in Applied Science and Engineering Technology  
A "Greedy Depth-First search" algorithm is provide efficient multi-keywords ranked search and it used for achieving efficient searching in the large database.  ...  Cloud is one of the type of application which can be used by using Internet for storing, inserting or managing the data for very less cost.  ...  To perform a search, the data user must be authorized by the data owner. The user generates a trapdoor function when the search request is sent to the cloud server.  ... 
doi:10.22214/ijraset.2017.4116 fatcat:li5e7uynrfgkhljg4lj4yqw4ri

Search Technique on Encrypted Cloud Data for Conceptual Information

Seelam Sowjanya
2019 International Journal for Research in Applied Science and Engineering Technology  
So, it is essential to secure information prior to outsourcing them right into cloud to secure the personal privacy of delicate information [8] Li et alia offered a safe and secure personal privacy maintaining  ...  Third, a search demand normally concentrates on a style, as well as some search words can be thought about to be the quality of the style, for instance, birthday celebration is a  ...  So, it is essential to secure info before outsourcing them right into cloud to safeguard the personal privacy of fragile info Li et alia provided a secure individual privacy keeping outsourced classification  ... 
doi:10.22214/ijraset.2019.5149 fatcat:hhx6ddy7vfemlgnu75o3jg2fza

Security Issues In Cloud Computing

Balachandrudu K E
2012 IOSR Journal of Engineering  
Next we discuss the use of secure coprocessors for cloud computing. Third we discuss XACML implementation for Hadoop.  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  Next we discuss the use of secure coprocessors for cloud computing. Third we discuss XACML implementation for Hadoop.  ... 
doi:10.9790/3021-021011423 fatcat:czcyaaio4jbsri6bbgaiw5z7gu

Study of Dynamic Multikeyword Text Search Techniques over Encrypted Data in Cloud

Ankita Puri, Naveen Kumari
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
requirements for such a secure cloud data utilization system to become a reality.  ...  In this paper, for the first time, we define and solve the challenging problem of privacy preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy  ...  In this paper, a large set of personal emails is used for the purpose of folder and subject classifications.  ... 
doi:10.23956/ijarcsse/v7i7/0110 fatcat:dktyjor7szchjpva4ahqlgcmce

Internet As A Application For Secured Data Transmission In Digital World

Sanjali S. Doshi
2016 Zenodo  
desire for military secrecy,industrial security,and information sharing. based on national and state laws,it is possible to establish some form of operational security,which allows the management of a  ...  decisions regarding access to information,whereas issues of security involve the procedures and safeguards for enforcing the privacy decisions . the motivations for security and privacy are found in the  ...  Search Engine:  Search engines have the ability to track a user's searches.  ... 
doi:10.5281/zenodo.1466307 fatcat:eqel7dflajhcfas2v3dzyd5yey

Survey of Privacy Data Protection Technology in Cloud Computing

Yang Wang
2016 DEStech Transactions on Computer Science and Engineering  
On the other hand, data security is also a prerequisite for users to store and share data in the Cloud computing platform.  ...  If the Cloud computing platform does not have a reasonable authentication mechanism, it would be possible for malicious unauthorized users to fake legitimate users then to conduct a variety of illegal  ... 
doi:10.12783/dtcse/icte2016/4795 fatcat:r5fhvk7e2naqdag7qr2og4b3a4

Protected Entree Design for Big Data Knowledge in Cloud

L. Sudha
2019 International Journal for Research in Applied Science and Engineering Technology  
To overcome this, we propose a new NTRU decryption procedure to overcome the decryption failures of the original NTRU without reducing the security strength of NTRU.  ...  Due to this the leakage of critical information are not well handled. Integrity and confidentiality of the personal information are questioned and are not secure.  ...  [7] The user can search keyword using the search query and attribute values in a framework using KSAC (keyword search with access control) over encrypted data in cloud computing.  ... 
doi:10.22214/ijraset.2019.3329 fatcat:g2cwh6cbuve25drkiiscdtcgnq

Survey on Secure and Efficient Content-Based Retrieval in Cloud Image Repositories

Yelapure Shital S
2020 International Journal for Research in Applied Science and Engineering Technology  
Larger part of the computationally serious part is handled by the cloud, and a querier can now simply send the query and get the search outcome.  ...  In this work, present a novel that is Privacy-protecting Content based Image Search framework on Cloud, or, in other words towards possible cloud services which give secure content based extensive scale  ...  They set up a set of strict privacy requirements for such a secure cloud storage utilization system.  ... 
doi:10.22214/ijraset.2020.2114 fatcat:tsyyn53ya5bljpgxdkfh3uppqa

Vulnerability Tracking in Cloud using Encryption

2019 International journal of recent technology and engineering  
Additionally, the unscrambling procedure just requires ultra-lightweight calculation, which is a fundamental component for vitality constrained gadgets.  ...  Nonetheless, approved client may purposefully uncover the mystery key for monetary advantage.  ...  LITERATURE SURVEY In modern world, due to the advent of technology, cloud storage security has become a great challenge for cloud service providers.  ... 
doi:10.35940/ijrte.d7521.118419 fatcat:v32pbvkx7zdujdyphkyh6pqzym

Protection Preserving Over Encrypted Data Using Key with Similarity Check

G Sabari prasanth, M Rajasekaran
2018 International Journal of Engineering & Technology  
This concept of combination of cloud computing and data mining gives us the good result of security of personal detail and unwanted data would not accommodate on the internet .This process would help mostly  ...  This approach have overcome security issues of own personal or organization data.  ...  The order of data flow are user would upload in cloud database Administrator would analyze the data and dealt up to the content in database. 1: function SEARCH(A, B, C) 2: for query ADi in query group  ... 
doi:10.14419/ijet.v7i3.12.16039 fatcat:u23l5qbq2zfdpiznlti4xdyglq

A Modified Approach on Security Analysis Using Probabilistic Order Preserving Encryption Based on Cloud Data Serach

Ingale Ashwini Nagnath
2017 International Journal Of Engineering And Computer Science  
So security is major issue for cloud computing .Existing system is based on searchable encryption (SE) with the popularity in cloud computing security and data.  ...  Order preserving encryption (OPE) is an efficient tool to encrypt relevance score of the inverted index for ranked search in encrypted cloud data.  ...  We can use TABLE 2 as an example to understand how a cloud server conduct a secure search based on an encrypted list.In this search procedure ,a user first generate a serach request i.e.  ... 
doi:10.18535/ijecs/v6i1.58 fatcat:cxv57sjvn5gr7khd7iwes3cram

Preserving Encryption Based Data Search

A.C. Southarraj
2017 International Journal for Research in Applied Science and Engineering Technology  
Hence the inception of computers had a great role in reducing large tasks to simpler one  ...  Through the technology, the manual process, defects and time consumption can be reduced. That's in all the area of business, computer technology is widely been implemented.  ...  Future work, elaborates these ideas to design secure methods of probabilistic OPE and schemes for search in encrypted data. A.  ... 
doi:10.22214/ijraset.2017.10220 fatcat:evuumgo4hnbt7n27u2zzb37gqi

CLOUD Profit or Loss : Google as Case

Rana M. Faek, AfraaSayahAlshammari, KusumYadav, EbtisamA. Hamed
2018 International Journal of Innovative Research in Applied Sciences and Engineering  
In this paper we are discussing the pros and cons of cloud storage usage among Arab users and the awareness of its security threats which will shed a further step to examining cloud computing and evaluate  ...  In recent times the cloud storage usage has is tremendously proved its significance in almost every discipline from knowledge, sciences and technology and education or business and management and the list  ...  Google cloud platform is a pioneer in today's information technology such as its searching engine [9] .  ... 
doi:10.29027/ijirase.v2.i3.2018.279-282 fatcat:lrvcvvwai5gbvlgjlhcil4yhfm

Systematic Review of Identity Access Management in Information Security

Mumina Uddin, David Preston
2015 Journal of Advances in Computer Networks  
A total of 40 articles were selected for the purpose of this study, after screening through detailed reading of the articles a total of 18 articles selected for the review.  ...  Data extracted by search engine using predefined search string which contain 127 articles, it was reviewed manually using the title and the abstract initially using the predefined eligibility criteria.  ...  ACKNOWLEDGMENT Knowledge and expertise of IAM and security has been gained through commercial experience within investment Banking used to compare literature review with real world issues.  ... 
doi:10.7763/jacn.2015.v3.158 fatcat:3knm76sd5jbdvj2ngfkvpbhdo4
« Previous Showing results 1 — 15 out of 52,910 results