Filters








5,427 Hits in 3.4 sec

An Approach Enabling Various Queries on Encrypted Industrial Data Stream

Tao Wang, Bo Yang, Guoyong Qiu, Lina Zhang, Yong Yu, Yanwei Zhou, Juncai Guo
2019 Security and Communication Networks  
Based on this scheme, an approach enabling various queries on the encrypted industrial data stream is proposed.  ...  Especially for the gateway, querying on the encrypted data only needs less than 20ms, which is practical for industrial data stream auditing scenario.  ...  From our proposed searchable encryption scheme, we present an approach enabling various queries on encrypted industrial data for general data flow structure, which includes data sources, gateway, and data  ... 
doi:10.1155/2019/6293970 fatcat:rvcn2wkzizh5jhhughrlluhowa

Securing Big Data systems, A cybersecurity management discussion [article]

Shakir A. Almasaari
2019 arXiv   pre-print
The paper discusses various security management for each part of big data systems. This includes security measures, standards, and methodologies.  ...  Big data platform stems its complexity from being a collection of interrelated non-standardized systems that interact with each other to process large data-sets.  ...  There are three role-based access control models that can be used to enable access control on data SECURING BIG DATA SYSTEMS 15 streams: preprocessing, postprocessing, and query rewriting.  ... 
arXiv:1912.08191v1 fatcat:o27rftworne5fmqtjjahwvtb6e

Design Approach to Big data Systems in Developing and Maintaining the Information Security Systems

Dr.Mani Sarma Vittapu
2016 IOSR Journal of Computer Engineering  
We face a series of technical challenges that have not been well addressed by both academic community and industry.  ...  Big Data provides materials for mining hidden patterns to support innovation mostly by data mining. The interaction research with Big Data support methods for innovation is rare at present.  ...  Today, big data has penetrated into various industries, and has become a kind of production factor which plays an important role. In the future it would be the highest point of the competition.  ... 
doi:10.9790/0661-1805036870 fatcat:iixpvp7yr5bs7fea34ejyusnei

Zeph: Cryptographic Enforcement of End-to-End Data Privacy [article]

Lukas Burkhalter, Nicolas Küchler, Alexander Viand, Hossein Shafagh, Anwar Hithnawi
2021 arXiv   pre-print
This paper presents Zeph, a system that enables users to set privacy preferences on how their data can be shared and processed.  ...  We introduce a hybrid cryptographic protocol for privacy-adhering transformations of encrypted data.  ...  This work was supported in part by the SNSF Ambizione Grant No. 186050 and an ETH Grant.  ... 
arXiv:2107.03726v1 fatcat:zb6gjzasurct3on3xj6ctwhwfa

SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing

M. Schrefl, K. Grun, J. Dorn
2005 21st International Conference on Data Engineering Workshops (ICDEW'05)  
SemCrypt thus enables to query and update encrypted XML documents on untrusted servers while ensuring data privacy.  ...  Filtering query results and processing as much as possible of the query/update statement on the server does not depend on special encryption techniques.  ...  Another paper by Bouganim and Pucheral [9] proposes an approach on "Chip-Secured Data Access: Confidential Data on Untrusted Servers".  ... 
doi:10.1109/icde.2005.280 dblp:conf/icde/SchreflGD05 fatcat:re2dn4gmnzds5cfmxsiwlmdrqy

Report on the fourth international workshop on cloud data management (CloudDB 2012)

Xiaofeng Meng, Fusheng Wang, Adam Silberstein
2013 SIGMOD record  
The authors propose a scheme based on CryptDB to evaluate queries over encrypted data streams.  ...  The paper A Security Aware Stream Data Processing Scheme on the Cloud and its Efficient Execution Methods by Katsuhiro Tomiyama et al. evaluates queries over encrypted data streams in the cloud.  ... 
doi:10.1145/2481528.2481540 fatcat:7uajyn2skrhvxgj4jlcqf2jxxe

A measurement study of offloading virtual network functions to the edge

S. R. Chaudhry, P. Liu, X. Wang, V. Cahill, M. Collier
2021 Journal of Supercomputing  
This approach has been validated by practical use cases with both TCP and UDP as underlying protocol on a physical testbed environment.  ...  We examine the performance implications of executing a security VNF at an FPGA-equipped edge server.  ...  Also, like the above works, this approach does not rely on an orchestration platform to handle a compute-intensive task such as encryption at a very high data-rate.  ... 
doi:10.1007/s11227-021-03907-0 fatcat:zsfyj6vxj5fo5p6rwps6fttb34

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
In the past, researchers have employed several privacy preservation approaches including cryptographic encryption and k-anonymity to secure IoT-enabled critical infrastructure.  ...  Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains.  ...  Industrial IoT (IIoT) is the term used to refer to the use of certain IoT technologies and various smart objects in an industrial setting for the promotion of goals distinctive to the industry [250] .  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

Survey on Secure Search Over Encrypted Data on the Cloud [article]

Hoang Pham, Jason Woodworth, Mohsen Amini Salehi
2018 arXiv   pre-print
These techniques enable various types of search on the encrypted data and offer different levels of security.  ...  Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted.  ...  that perform various forms of search operation on encrypted data located on an untrusted third-party cloud.  ... 
arXiv:1811.09767v1 fatcat:scgxzjjnvfbbbnh7wxpr6eu5ci

A Framework for Efficient Storage Security in RDBMS [chapter]

Bala Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu
2004 Lecture Notes in Computer Science  
We also assess the performance of our proposed model by experimenting with a prototype implementation based on the well-known TPC-H data set.  ...  products has become an increasingly important topic.  ...  There are basically two approaches to building an index based on sensitive attribute values.  ... 
doi:10.1007/978-3-540-24741-8_10 fatcat:nrnw7nyjtnh6bkqtyycyxcjsui

Report on the first international workshop on cloud intelligence (Cloud-I 2012)

Jérôme Darmont, Torben Bach Pedersen
2014 SIGMOD record  
the Cloud", propose an efficient and Secure Data Sharing (SDS) framework using homomorphic encryption and proxy re-encryption schemes that prevents the leakage of unauthorized data when a revoked user  ...  Various individual approaches and combinations of such approaches are proposed to provide the first steps towards integrating efficient top-k processing in MapReduce.  ... 
doi:10.1145/2590989.2591001 fatcat:wet2qfknj5apte3u2chkxclxtm

IoTCrawler: Browsing the Internet of Things

Antonio F. Skarmeta, Jose Santa, Juan A. Martinez, Josiane X. Parreira, Payam Barnaghi, Shirin Enshaeifar, Michail J. Beliatis, Mirko A. Presser, Thorben Iggena, Marten Fischer, Ralf Tonjes, Martin Strohbach (+2 others)
2018 2018 Global Internet of Things Summit (GIoTS)  
To achieve an open IoT ecosystem of systems and platforms, several key enablers are needed for effective, adaptive and scalable mechanisms for exploring and discovering IoT resources and their data/capabilities  ...  IoTCrawler targets IoT development and demonstrations with a focus on Industry 4.0, Social IoT, Smart City and Smart Energy use cases.  ...  To enable the use of IoT data and to exploit the business potential of IoT applications an effective approach needs to provide: • An adaptive distributed framework enabling abstraction from heterogeneous  ... 
doi:10.1109/giots.2018.8534528 dblp:conf/giots/SkarmetaSMPBEBP18 fatcat:tqapi66muvhp5ckxyn3ttseqza

Anonymization Framework for IoT Resource Discovery based on Edge Centric Privacy Model

2020 International Journal of Engineering and Advanced Technology  
In this paper we have developed a system that uses fog computing approach to perform various tasks and filters the sensitive data, thus helps in preserving privacy.  ...  However, the edge-cloud system provides more flexibility and capability to counter the sensitive data streaming and analytics services within the constrained IoT framework.  ...  [20] Industrial IoT Location Privacy Protection based on Differential Privacy Strategyfor Big Data in Industrial Internet-of Things.  ... 
doi:10.35940/ijeat.b2109.1210220 fatcat:kl3xz6spmbeurgtm7dlvdxnojy

Big data management: Security and privacy concerns

Ibrahim A. Atoum, Computer and Information Sciences Department, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia, Ismail M. Keshta, Computer and Information Sciences Department, College of Applied Sciences, AlMaarefa University, Riyadh, Saudi Arabia
2021 International Journal of Advanced and Applied Sciences  
This article presents some of the major concerns surrounding the application and use of Big Data about challenges of security and privacy of data stored on technological devices.  ...  Nevertheless, the issue of data protection or privacy is a threat to big data management.  ...  The Encrypted Big Query Client is based on similar operation models as CryptDB which allows encrypted big queries to be executed against their BigQuery service that enables super, SQL-like queries against  ... 
doi:10.21833/ijaas.2021.05.009 fatcat:npjxq4uiazg4hd7tlt7d2emmjm

A Survey on Blockchain-Based Search Engines

Esmaeel Rezaee, Ali Mohammad Saghiri, Agostino Forestiero
2021 Applied Sciences  
With the increasing growth of different types of data, search engines have become an essential tool on the Internet.  ...  With a blockchain-based search system, no company can lay claims to user's data or access search history and other related information. All these data will be encrypted and stored on a blockchain.  ...  The searcher: This subsystem, which is an online component, processes a stream of queries.  ... 
doi:10.3390/app11157063 fatcat:pgymctrvizekvbh3frma6hllza
« Previous Showing results 1 — 15 out of 5,427 results