Filters








4,800 Hits in 2.9 sec

Secured Service Chains Tuned Resource Sharing using Nsdp

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
To enjoy these services, individuals or organizations store their private data on cloud servers. The semantic-based keyword search over encrypted cloud data becomes of paramount importance.  ...  compound concepts.  ...  Privacy preserving keyword based semantic search over encrypted data will containing two clouds one is private cloud and another one is public cloud for storing the data over encrypted scheme using keyword  ... 
doi:10.35940/ijitee.j9410.0881019 fatcat:6qpwsvhuivakdowmjlpnv4jrwq

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud

Zhenghong Wang, Zhangjie Fu, Xingming Sun
2018 Security and Communication Networks  
In this paper, we define and construct semantic search encryption scheme for context-based conceptual graph (ESSEC).  ...  Finally, experiments based on real data show that the scheme is effective and feasible.  ...  [18] proposes a verifiable diversity ranking search scheme over encrypted outsourced data.  ... 
doi:10.1155/2018/1420930 fatcat:iarqv2mogbet7hd53ea6eyf57u

Survey on Keyword Search in Encrypted Data With Privacy Preservation

2016 International Journal of Science and Research (IJSR)  
In this paper, we investigate the idea behind single keyword search over encrypted data and also multi keyword ranking.  ...  This manipulation of data at cloud server gives rise to so many security issues because data is accessed over internet. For security purpose data is store in encrypted format.  ...  Lou concept based utilized to realize the calculation method keyword search Outsourced Cloud Data search methods rank mechanism Algorithms [12] 3 Privacy-preserving .  ... 
doi:10.21275/v5i1.nov153041 fatcat:sh5vdcxzv5hzzcejyvhpwo627i

Search Technique on Encrypted Cloud Data for Conceptual Information

Seelam Sowjanya
2019 International Journal for Research in Applied Science and Engineering Technology  
Key terms: Searchable encryption, cloud computing, smart semantic search, concept hierarchy. I.  ...  In this paper, we recommend one-of-a-kind semantic search plan based upon the principle class structure as well as likewise the semantic link in between concepts in the encrypted datasets.  ...  As a result, it is an extremely vital as well as tough job to apply semantic search over encrypted information. II.  ... 
doi:10.22214/ijraset.2019.5149 fatcat:hhx6ddy7vfemlgnu75o3jg2fza

Searching Techniques over Encrypted Cloud Data

Azza A., Shereen Saleh, Passent Elkafrawy
2019 International Journal of Computer Applications  
This study focuses on different searching techniques over the encrypted data in cloud.  ...  Nowadays, large amount of data can be stored in the cloud. To preserve the secrecy of the data, the data must be encrypted.  ...  Privacy Preserving Synonym Based Fuzzy Multi-Keyword Ranked Search over Encrypted Cloud Data(BBSBFMRS).  ... 
doi:10.5120/ijca2019918676 fatcat:xhtgrgaqbnhqllebjady6xddiy

FSSE: An effective fuzzy semantic searchable encryption scheme over encrypted cloud data

Guoxiu Liu, Geng Yang, Shuangjie Bai, Qiang Zhou, Hua Dai
2020 IEEE Access  
In this paper, we propose an effective fuzzy semantic searchable encryption scheme (FSSE) that supports multi-keyword search over encrypted data in cloud computing.  ...  INDEX TERMS Searchable encryption, cloud computing, fuzzy semantic search, multi-keyword search.  ...  [27] used the concept map to implement the semantic search of encrypted data. Fu et al.  ... 
doi:10.1109/access.2020.2966367 fatcat:orkkgtizl5antctrbnaba2bw7i

User Specific Semantic Search for Encrypted Data

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper, the user specific semantic search for the various encrypted data (USSSED) is introduced to overcome the issues in the previous systems.  ...  Accessing of cloud data which is encrypted is most widely used with the help of many encryption and decryption algorithms.  ...  PROPOSED SYSTEM W We propose a efficient searchable encrypted scheme based on concept hierarchy supporting semantic hunt with two cloud servers. a thought chain of importance tree is made hooked in to  ... 
doi:10.35940/ijitee.d2026.029420 fatcat:7oaqmp4curfcdeiagg5d6sgklu

Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee, Tae Choong Chung, Yeng-Tseng Wang
2016 PLoS ONE  
To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain.  ...  However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information.  ...  It proposes an index-based privacy-aware data search methodology which can identify a semantic match between encrypted data and search criteria.  ... 
doi:10.1371/journal.pone.0161440 pmid:27571421 pmcid:PMC5003394 fatcat:7fsptnc4w5empd36qj6khcelzq

Review on Multi-User Multi-Keyword Privacy Preserving Ranked Based Search Over Encrypted Cloud Data

2017 International Journal of Recent Trends in Engineering and Research  
In this paper, for the first time, we define and solve the challenging problem of privacypreserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements  ...  Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely differentiate the search results.  ...  The author in this paper [13] , propose a semantic multi-keyword ranked search scheme over the encrypted cloud data, which simultaneously meets a set of strict privacy requirements.  ... 
doi:10.23883/ijrter.2017.3158.7f3gy fatcat:d7c7gmoy75fqtcsxtdctsxekxe

Ranked multi-keyword search data using cloud

Sneha Shete, Nilima Dongre
2017 2017 International Conference on Inventive Computing and Informatics (ICICI)  
These concepts are discussed in the following sections. Fig 1 shows the architecture of the Mining Model. DATA USER:This module includes the user registration login details.  ...  Using Cloud Computing customers can remotely outsource their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources  ...  VI.CONCLUSION I perform a ranked search of multi-keyword over encrypted cloud data.  ... 
doi:10.1109/icici.2017.8365200 fatcat:qg2vsf7usbaw3lyxj4gxfgjndy

Efficient Semantic Keyword Search and Dynamic Update over Encrypted Cloud Data

Meenu K. R., Theresa Jose
2015 International Journal of Engineering Research and  
Thus, the search over encrypted data is of predominant importance to provide maximum data utilization for encrypted cloud data.  ...  The traditional privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud data (MRSE) schemes involves much overhead in terms of storage and search time.  ...  The proposed system performs semantic keyword search over encrypted cloud data with maximum privacy settings and minimum overhead.  ... 
doi:10.17577/ijertv4is090662 fatcat:wjupe7urknd55g6cukb54u7ziy

A Light Weight Cryptographic Technique for Secure Outsourcing and Retrieval of Data in Cloud Computing

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
It is still an open challenge to develop light weight cryptographic methods for secure storage and retrieval or search for outsourced encrypted data.  ...  Outsourcing large volumes of data to public cloud has the potential benefits to consumers. It also brings security issues as the cloud is treated as untrusted from the user point of view.  ...  However, semantics based search over encrypted data is not covered. Selvakumar et al. [16] employed data partitioning technique in order to have better solution for data security in public cloud.  ... 
doi:10.35940/ijitee.j1073.0881019 fatcat:rjret5kfh5bwdfoipqn34tnksm

Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption

Redwan Walid, Karuna P. Joshi, Seung Geol Choi, Dae-young Kim
2020 2020 IEEE International Conference on Big Data (Big Data)  
As the volume of cloud-based EHRs reaches Big Data levels, it is essential to search over these encrypted patient records without decrypting them to ensure that the medical caregivers can efficiently access  ...  Cloud-based electronic health records (EHR) systems provide important security controls by encrypting patient data. However, these records cannot be queried without decrypting the entire record.  ...  The conception of valid and reliable information retrieval procedures over encrypted data are of paramount concern as encryption greatly obsoletes the conventional private information retrieval over plaintext  ... 
doi:10.1109/bigdata50022.2020.9378002 fatcat:rdhtvkjhcrbjhhgawq2b7lqfae

Semantic, Efficient, and Secure Search over Encrypted Cloud Data [article]

Fateh Boucenna
2020 arXiv   pre-print
To perform searches over outsourced data, it is no longer possible to exploit traditional search engines given that these data are encrypted.  ...  Therefore, It is primordial to protect the outsourced data against possible external attacks and the cloud server itself.  ...  The set of vectors corresponds to the search index, which is encrypted using SkNN algorithm and hash functions. "Fu et al." proposed a concept based semantic search over encrypted cloud data [68] .  ... 
arXiv:2002.10294v1 fatcat:nbumfcohyrbjxmwypu4aagbv4u

Multi-keyword Ranked Search Over Encrypted Cloud Data Supporting Synonym Query

2016 International Journal of Science and Research (IJSR)  
The search techniques which are used on plain text cannot be used over encrypted data. The existing solutions supports only identical keyword search, semantic search is not supported.  ...  By encrypting data improves the data security but the data efficiency is decreased because searching on encrypted data is difficult.  ...  A semantic secure multi-keyword search scheme over encrypted cloud data is proposed in this paper.  ... 
doi:10.21275/v5i6.nov164822 fatcat:o4v3dkdzyvhydbw7yu6kzdk5zq
« Previous Showing results 1 — 15 out of 4,800 results