33,275 Hits in 4.9 sec

Combined Keyword Search over Encrypted Cloud Data Providing Security and Confidentiality

Y. Srikanth, M. Veeresh Babu, P. Narasimhulu
2013 International Journal of Computer Applications  
In this paper proposes multi-user searchable encryption with the help of order preserve encryption for providing efficient encrypted data. when proposed these constructions it formally defines the multiuser  ...  settings for ranked keyword search by using searchable symmetric encryption and order preserve symmetric encryption.  ...  It is an example which explains about the efficiency of the cloud services by using adaptive security and order preserving symmetric encryption.  ... 
doi:10.5120/13097-0394 fatcat:jtzctkeokjbp7dryid7mwejlbq

Privacy-Preserving Computation [chapter]

Florian Kerschbaum
2014 Lecture Notes in Computer Science  
In this paper we present a review of security mechanisms and a research agenda for privacypreserving computation.  ...  Once addressed, privacy-preserving computations can quickly become a reality enhancing the privacy protection of citizens.  ...  The efficiency gain of order-preserving encryption mainly stems from its main difference to the homomorphic encryption.  ... 
doi:10.1007/978-3-642-54069-1_3 fatcat:sbvog74h2va6xibazies2hh3ca

Cryptography and Data Security in Cloud Computing

Zheng Yan, Robert H. Deng, Vijay Varadharajan
2017 Information Sciences  
In the article "Semi-Order Preserving Encryption", Yang et al. proposed the notation of semi-order preserving encryption (SOPE) as a substitute for OPE.  ...  Order Preserving Encryption (OPE) is a kind of encryption designed to support search on ciphertexts. But existing schemes suffer from the problems of security and ciphertext expansion.  ... 
doi:10.1016/j.ins.2016.12.034 fatcat:r234lwyjqva5rbc45mltma4hjq


Abirami. A, Chandrakala. D
2016 ELK Asia Pacific Journal of Computer Science and Information Systems  
KEYWORDS: Security, K-NN classifier, outsourced databases, encryption.  ...  INTRODUCTION: Data mining is the subfield of computer science and is the computational process of discovering patterns in large data sets. It is said to be the analysis step of discovering knowledge.  ...  The accuracy value is increased and the security and privacy is improved efficiently which is the advantage of using order preserving encryption scheme.  ... 
doi:10.16962/eapjcsis/issn.2394-0441/20160930.v2i1.01 fatcat:jatloegoufe6xnmuwmwdfn6xxi

A secure order-preserving indexing scheme for outsourced data

Somayeh Sobati Moghadam, Gerald Gavint, Jerome Darmonti
2016 2016 IEEE International Carnahan Conference on Security Technology (ICCST)  
We present a new order-preserving scheme for indexing encrypted data, as an alternative to propertypreserving schemes, which hides data frequency to achieve a strictly stronger notion of security.  ...  The inherent merits of property-preserving encryption schemes make them very suitable and efficient for cloud data outsourcing.  ...  For instance, order-preserving encryption (OPE) preserves the order of plaintext in ciphertexts.  ... 
doi:10.1109/ccst.2016.7815719 dblp:conf/iccst/MoghadamGD16 fatcat:iqwm5lr7lvgobc4765or2s4jsu

A Comprehensive Analysis of Privacy-preserving Techniques in Deep learning based Disease Prediction Systems

J Andrew, Shaun Shibu Mathew, Batra Mohit
2019 Journal of Physics, Conference Series  
In this paper we carry out a comprehensive analysis of privacy-preserving techniques for disease prediction systems that use deep learning along with a comparison of the different privacy-preserving techniques  ...  They are cryptographic approaches, attribute-based encryptions, homomorphic encryptions and other hybrid approaches.  ...  In order to achieve a secure and efficient model, the HPCS uses three phases.  ... 
doi:10.1088/1742-6596/1362/1/012070 fatcat:qi6ytovxzbflfficpa4ifkd7gu

Privacy-Preserving Techniques and System for Streaming Databases

Anderson Santana de Oliveira, Florian Kerschbaum, Hoon Wei Lim, Su-Yang Yu
2012 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing  
We demonstrate efficient privacy-preserving event correlation using equality tests, greater-than comparisons and range queries.  ...  These can be addressed by a number of cryptographic techniques. In this paper we consider highperformance symmetric encryption techniques.  ...  Secure computation [16] , [27] allows the distributed computation of any function (with a public output) while preserving the privacy and confidentiality of the inputs.  ... 
doi:10.1109/socialcom-passat.2012.85 dblp:conf/socialcom/OliveiraKLY12 fatcat:agv6z3s4ozhcnb7mg6vjwec7di

Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases

Mahboob Qaosar, Asif Zaman, Md. Siddique, Annisa, Yasuhiko Morimoto
2019 Information  
However, most of them use computationally expensive secure comparison protocol for comparing homomorphically encrypted data.  ...  We use a secure multi-party sorting protocol that uses the homomorphic encryption in the semi-honest adversary model for transforming each attribute value of the objects without changing their order on  ...  procedure from secure multi-party databases in an efficient and privacy-preserving way.  ... 
doi:10.3390/info10030119 fatcat:yopyjlipfvflfiltaoztv2szm4

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing

Guoxiu Liu, Geng Yang, Huaqun Wang, Yang Xiang, Hua Dai
2018 Security and Communication Networks  
We conduct security analysis and efficiency evaluation of the proposed scheme FHOPE.  ...  Moreover, repeated encryptions will reduce the efficiency of execution.  ...  Our proposed scheme is an ideal security homomorphic order-preserving encryption scheme where the ciphertexts reveal nothing except for the order of the plaintext values.  ... 
doi:10.1155/2018/7383514 fatcat:hpmdtj37dncovott6wzfoeb2de

Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing

Vasudha Arora, S.S. Tyagi
2015 International Journal of Computer Applications  
Data encryption protects data security to some extent, but this may lead to a compromise on the part of efficiency of storage and retrieval on the server.  ...  These searchable encryption schemes allow retrieval of encrypted data over the cloud thereby making data retrieval fast and efficient. These schemes also guarantee high security and efficiency.  ...  But in an security oriented third party cloud computing scenario security can never be the tradeoff for efficiency.  ... 
doi:10.5120/ijca2015906567 fatcat:hbhbnk4owbguxbzaq26fjluy64


Hossein Shafagh, Anwar Hithnawi, Andreas Droescher, Simon Duquennoy, Wen Hu
2015 Proceedings of the 21st Annual International Conference on Mobile Computing and Networking - MobiCom '15  
We enable this by encrypting IoT data with a set of cryptographic schemes such as order-preserving and partially homomorphic encryptions.  ...  To achieve this on resource-limited devices, our system relies on optimized algorithms that accelerate partial homomorphic and orderpreserving encryptions by 1 to 2 orders of magnitude.  ...  For instance, the UDF for an ordering-related query (e.g., order by, MAX, MIN) is aware of the order-preserving encryption and computes the result without access to the plaintext values.  ... 
doi:10.1145/2789168.2795172 dblp:conf/mobicom/ShafaghHDDH15 fatcat:j5t3cl52z5dajd6mfg45ec5r4a

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

2018 KSII Transactions on Internet and Information Systems  
In order to realize privacy preservation, sensitive data should be encrypted before outsourcing.  ...  Encryption of queries and decryption of encrypted queries results are performed at client.  ...  Surprisingly, to the best of our knowledge, none of the existing works can solve the SQL query over encrypted Database in Cloud Computing in a secure and efficient manner. Privacy-preserving.  ... 
doi:10.3837/tiis.2018.07.021 fatcat:b27rgdixzffmvlras2oxaclfme

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Wei Zhang, Yaping Lin, Sheng Xiao, Jie Wu, Siwang Zhou
2016 IEEE transactions on computers  
To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel Additive Order and Privacy Preserving Function family.  ...  For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model.  ...  A preliminary version of this paper appeared in the Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'14) [27] .  ... 
doi:10.1109/tc.2015.2448099 fatcat:37wcnfb6yzb73agr3cbk2mujmu

Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel

Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin
2013 Mathematical Problems in Engineering  
In order to break this deadlock, this paper first presents an efficient secure multiparty computation protocol for the general privacy-preserving sequencing problem based on symmetric homomorphic encryption  ...  However, due to the difficulties of solving multiparty privacy preserving sequencing problem, related secure protocol is extremely rare.  ...  In Section 3, we present the new efficient secure multiparty computation protocol for privacy-preserving sequencing problem over insecure channel.  ... 
doi:10.1155/2013/172718 fatcat:ewzgufgrxrgkpfj2pcnmzqzgsa

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Cong Wang, Ning Cao, Kui Ren, Wenjing Lou
2012 IEEE Transactions on Parallel and Distributed Systems  
., relevance score, from information retrieval to build a secure searchable index, and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information.  ...  Cloud computing economically enables the paradigm of data service outsourcing.  ...  A preliminary version [1] of this paper was presented at the 30th International Conference on Distributed Computing Systems (ICDCS '10).  ... 
doi:10.1109/tpds.2011.282 fatcat:mjohm7kas5bbxklrxfpjmf2jla
« Previous Showing results 1 — 15 out of 33,275 results