Filters








1,510 Hits in 4.6 sec

An Efficiently Searchable Encrypted Data Structure for Range Queries [article]

Florian Kerschbaum, Anselme Tueno
2017 arXiv   pre-print
In this paper we present an efficiently searchable, encrypted data structure that is provably secure against these and even more powerful chosen plaintext attacks.  ...  At CCS 2015 Naveed et al. presented first attacks on efficiently searchable encryption, such as deterministic and order-preserving encryption.  ...  AN IND-CPA-DS-SECURE ESEDS FOR RANGE QUERIES We next present our efficiently searchable, encrypted data structure for range queries that is IND-CPA-DS-secure.  ... 
arXiv:1709.09314v1 fatcat:ncia54rkybe5dcfptropsaq5oi

An Encrypted In-Memory Column-Store: The Onion Selection Problem [chapter]

Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert
2013 Lecture Notes in Computer Science  
This adjustment of the encryption entails a translation of an SQL query to an equivalent query on encrypted data.  ...  Processing encrypted queries in the cloud has been extended by CryptDB's approach of adjustable onion encryption.  ...  Therefore searchable encryption may not be used for retrieval. Efficiency of searchable encryption is significantly lower than deterministic encryption.  ... 
doi:10.1007/978-3-642-45204-8_2 fatcat:dhc4y3lgujgj3p4rqporx7pzxq

A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data

Ch.V.B.Neeraja ., Dept. of Computer Science and Engineering, University college of engineering JNTUK, Kakinada, India, Dept. of Computer Science and Engineering, University college of engineering JNTUK, Kakinada, India, S.S.S..Usha Devi N
2018 International Journal of Scientific Research in Computer Sciences and Engineering  
Spatial data consists of geographic and geometric data primitives. Searching on spatial data is carried by geometric range queries. FastGeo, an efficient two-level search scheme is introduced.  ...  An honest-but-curious server efficiently performs geometric range queries and returns data points that are inside the geometric region to the client without learning query or sensitive information.  ...  Range query result Client sends spatial data and geometric range query as an input to the server, where the spatial data is encrypted.  ... 
doi:10.26438/ijsrcse/v6i5.2529 fatcat:wzmjtbtsdzc23bmixb75dclkrq

A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

Guangchun Luo, Ningduo Peng, Ke Qin, Aiguo Chen
2014 The Scientific World Journal  
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud  ...  However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different  ...  [31] is a space-efficient probabilistic data structure that is used to test whether an element is a member of a set = ( 1 , . . . , ). The set is coded as an array of bits.  ... 
doi:10.1155/2014/153791 pmid:24719565 pmcid:PMC3956551 fatcat:ctnsthhf6nakdovjc5e5mwwepy

Toward privacy-assured and searchable cloud data storage services

Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. T. Hou
2013 IEEE Network  
Acknowledgments The authors would like to thank the reviewers for their helpful comments. Li's work was partly supported by the U.S.  ...  A structured searchable encryption scheme transforms the original data into: an encrypted structure index g, and encrypted data items C = {c 1 , …, c n }.  ...  The above system architecture captures a wide range of searchable cloud data storage applications.  ... 
doi:10.1109/mnet.2013.6574666 fatcat:mq2f4esfizemrkopan34m247ua

Maple

Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
Then, by leveraging an existing predicate encryption in a novel way, our tree-based MDRSE efficiently indexes and searches over encrypted cloud data with multi-dimensional tree structures (i.e., R-trees  ...  This posts a great challenge for effectively utilizing cloud data, such as executing common SQL queries.  ...  (Multi-Dimensional Range Searchable Encryption).  ... 
doi:10.1145/2590296.2590305 dblp:conf/ccs/WangHLWL14 fatcat:zqkzrgw5jrcqfbintq3n6oan2e

An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing

Vasudha Arora, S.S. Tyagi
2016 International Journal of Computer Network and Information Security  
In this paper, we are going to propose our an efficient multi-keyword symmetric searchable encryption scheme for secure data outsourcing and evaluate the performance of our proposed scheme on a real data  ...  Symmetric searchable encryption (SSE) schemes allow a data owner to encrypt its data in such a way that it could be searched in encrypted form.  ...  It allows the indexing and query processing on encrypted data as efficient as on unencrypted data.  ... 
doi:10.5815/ijcnis.2016.11.08 fatcat:7fvkhssugbgqtfnrqmeutj7loy

A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing [article]

B.T. Prasanna, C.B. Akki
2015 arXiv   pre-print
Different methods for securing the data in cloud have been proposed by researchers including but not limited to Oblivious RAM, Searchable Encryption, Functional Encryption, Homomorphic Encryption etc.  ...  This paper focuses on Searchable and Homomorphic Encryption methods. Finally, a comparative study of these two efficient cloud cryptographic methods has been carried out and given here.  ...  Section 5 concludes with an utter need of efficient cryptographic methods like Searchable Encryption for further study and research. II.  ... 
arXiv:1505.03263v1 fatcat:6lugnvheqnepfecz2j6mbjqoyu

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency

Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
2018 IEEE Transactions on Dependable and Secure Computing  
For a long time, forward privacy implies inefficiency and thus most existing searchable encryption schemes do not support it.  ...  Recently, several practical attacks raised serious concerns over the security of searchable encryption.  ...  ACKNOWLEDGMENT The authors would like to thank the editor and the anonymous reviewers for their help in improving the paper. This work is supported by the National Natural Science Foundation of China  ... 
doi:10.1109/tdsc.2018.2822294 fatcat:rqvdog72wbewjjqo6kpzb4mshi

Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing

Vasudha Arora, S.S. Tyagi
2015 International Journal of Computer Applications  
This paper analyzes various searchable encryption schemes where data owner itself is responsible for his data security.  ...  These searchable encryption schemes allow retrieval of encrypted data over the cloud thereby making data retrieval fast and efficient. These schemes also guarantee high security and efficiency.  ...  The reason for interest in such schemes is that they allow efficient range queries on encrypted data i.e a remote untrusted data base server is able to index the encrypted data it receives in a data structure  ... 
doi:10.5120/ijca2015906567 fatcat:hbhbnk4owbguxbzaq26fjluy64

Framework for Searchable Encryption with SQL Databases

Monir Azraoui, Melek Önen, Refik Molva
2018 Proceedings of the 8th International Conference on Cloud Computing and Services Science  
We extend the solution for searchable encryption designed by Curtmola et al., to the case of SQL databases. We also provide features for evaluating range and boolean queries.  ...  Searchable encryption is a powerful tool that attempts to solve the challenge of querying data outsourced at untrusted servers while preserving data confidentiality.  ...  For these reasons, we opt for another data structure, simpler to implement, more practical and more flexible, namely a cuckoo hash table. We give an overview of this data structure in Section 3.4.  ... 
doi:10.5220/0006666100570067 dblp:conf/closer/AzraouiOM18 fatcat:tnnecmfy7zhn3cdmlsfphjs5qe

DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data

S Raghavendra, Geeta Mara, Rajkumar Buyya, Venugopal Kuppanna Rajuk, Sitharama Iyengar, L M Patnaik
2016 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT)  
Experiments have been conducted on real world dataset to validate proposed DRSIG scheme.It is observed that DRSIG scheme is efficient and provide more secure data than Ranked Searchable Symmetric Encryption  ...  Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage.  ...  In this structure, the data owner have insufficient resources for storing confidential data to the semi trusted cloud server.  ... 
doi:10.1109/icctict.2016.7514648 fatcat:6h6ci5zbbbe2xbfby5r7knkl74

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities

Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
In this position paper, we identify the importance and challenges of designing privacyassured, flexible and practically efficient search mechanisms for outsourced cloud data services.  ...  In particular, we focus on two representative types of flexible search functionalities: ranked keyword search, and search over structured data.  ...  The authors would like to thank the anonymous reviewers for their helpful comments. W. Lou is partly supported by NSF under Grant CNS-1155988, and Y. T.  ... 
doi:10.1109/icdcsw.2012.41 dblp:conf/icdcsw/LiYLH12 fatcat:etuikjcsv5dgbgoiya7rkms5je

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

Mikhail Strizhov, Zachary Osman, Indrajit Ray
2016 Future Internet  
Specifically, our construction uses the position heap tree data structure and achieves asymptotic efficiency comparable to that of an unencrypted position heap tree.  ...  Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that  ...  We are grateful to anonymous referees for their constructive comments and valuable suggestions that helped to improve this paper.  ... 
doi:10.3390/fi8030028 fatcat:5c4lrleskvfkvcwk3eqc2rvnru

Survey on Secure Search Over Encrypted Data on the Cloud [article]

Hoang Pham, Jason Woodworth, Mohsen Amini Salehi
2018 arXiv   pre-print
Searchable Encryption (SE) techniques have been widely studied to enable searching on the data while they are encrypted.  ...  In this paper, we provide a comprehensive survey on different secure search techniques; a high-level architecture for these systems, and an analysis of their performance and security level.  ...  More advanced and efficient searchable encryption systems are mentioned later.  ... 
arXiv:1811.09767v1 fatcat:scgxzjjnvfbbbnh7wxpr6eu5ci
« Previous Showing results 1 — 15 out of 1,510 results