656 Hits in 9.0 sec

A Survey on Storage Techniques in Cloud Computing

Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga
2017 International Journal of Computer Applications  
One of the services provided by cloud computing is cloud storage that enables the upload and the retrieval of different kinds of data.  ...  Accessing cloud storage service through Internet and pay as you used subscription have been the reasons for the emergence of methods and techniques to effectively store data and reduce storage security  ...  New efficient spatial query algorithms, range queries and k-NN queries for the proposed KR+-index are redefined.  ... 
doi:10.5120/ijca2017913472 fatcat:joak5sjqajfqzg74xq5hzivyee

Enjoy the Untrusted Cloud: A Secure, Scalable and Efficient SQL-like Query Framework for Outsourcing Data [article]

Yaxing Chen, Qinghua Zheng, Dan Liu, Zheng Yan, Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou
2019 arXiv   pre-print
One key challenging issue is how to efficiently perform queries over the ciphertext.  ...  While the security of the cloud remains a concern, a common practice is to encrypt data before outsourcing them for utilization.  ...  Our proposed QShield also exploits SGX to enable secure and efficient SQL-like queries over encrypted data.  ... 
arXiv:1912.08454v1 fatcat:rpneibrekja75ju533quvr72om

Anonymous Privacy-Preserving Task Matching in Crowdsourcing

Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, Robert H. Deng
2018 IEEE Internet of Things Journal  
The proposed scheme not only protects data confidentiality and identity anonymity against the crowd-server, but also achieves query traceability against dishonest or revoked workers.  ...  efficient worker revocation.  ...  Another alternative solution is to utilize broadcast encryption to generate a distinct secret key for each user, and thus every user can query the encrypted data with its own key [28] .  ... 
doi:10.1109/jiot.2018.2830784 fatcat:yn7pnzrkgvhhjmwqiwdatcktv4


Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan
2011 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11  
It works by executing SQL queries over encrypted data using a collection of efficient SQL-aware encryption schemes.  ...  CryptDB can also chain encryption keys to user passwords, so that a data item can be decrypted only by using the password of one of the users with access to that data.  ...  We also thank Geoffrey Thomas, Quentin Smith, Mitch Berger, and the rest of the maintainers for providing us with SQL query traces.  ... 
doi:10.1145/2043556.2043566 dblp:conf/sosp/PopaRZB11 fatcat:zf32yqczuvc73bd35met4mrrry

A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data

Yuan Ping, Wei Song, Zhili Zhang, Weiping Wang, Baocang Wang
2020 Information  
Based on the keywords trapdoor, we present the keywords vector to make the scheme realize multi-keyword search in the process of data retrieval in the ED.  ...  With the rapid development of cloud computing, massive data are transferred to cloud servers for storage and management savings. For privacy concerns, data should be encrypted before being uploaded.  ...  The funders had no role in the design of the study; in the collection, analyses or interpretation of data; in the writing of the manuscript or in the decision to publish the results.  ... 
doi:10.3390/info11080394 fatcat:kxx527tx4vgj5dhf47yzm3yye4

Fuzzy Keywords enabled Ranked Searchable Encryption Scheme for a Public Cloud Environment

Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan
2018 Computer Communications  
Our security analysis yields that the construction satisfies strong security guarantees and is also quiet lightweight, by analyzing its performance over the speech corpus.  ...  Searchable Encryption allows a user or organization to outsource their encrypted documents to a Cloudbased storage service, while maintaining the ability to perform keyword searches over the encrypted  ...  Attempts to design Searchable Encryption schemes for securely storing data on the Cloud while enabling keyword search have generally considered three factors: 1) Security and privacy; 2) Efficiency; and  ... 
doi:10.1016/j.comcom.2018.08.004 fatcat:tmyy6hvj4jfo5hyut7we456m3i

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients' information.  ...  We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the  ...  As searching encrypted data is arduous, SSE has been proposed that enable keyword searches across encrypted cloud data.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks

Fei Wang, YongJun Xu, Lin Wu, Longyijia Li, Dan Liu, Liehuang Zhu
2013 International Journal of Distributed Sensor Networks  
And we propose a public-encryption-with-fuzzy-keyword-search- (PEFKS-) and ciphertext-policy-attribute-based-encryption- (CP-ABE-) based distributed security scheme by refining and compromising two-pairing-based  ...  Our scheme enables opportunistic forwarding according to fuzzy interests preserving full privacy of users and ensures end-to-end confidentiality with a fine-grained access control strategy in an interest-centric  ...  control on shared data.  ... 
doi:10.1155/2013/469076 fatcat:lifsdzhzsnhudewjjjesvclyda

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection.  ...  The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message  ...  The article ''Efficient verifiable key-aggregate keyword searchable encryption for data sharing in outsourcing storage,'' by Wang et al., proposes an efficient verifiable key-aggregate keyword searchable  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges, State of the Art Methods and Future Directions

Rida Qayyum, Department of Computer Science, Government College Women University Sialkot, 51040, Pakistan
2020 International Journal of Wireless and Microwave Technologies  
However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server  ...  in MCC more efficiently.  ...  on MCC more efficiently.  ... 
doi:10.5815/ijwmt.2020.06.05 fatcat:fvrhastw3zdmzfzpbmnefvyeqm

Efficiently Data Analysis and Transmission for consumer using grid computing

Sindhuja R, Vasuinthira N
2018 International Journal of Trend in Scientific Research and Development  
Research focuses on the issue of wireless big data computing in smart grid.  ...  First investigate the consistency between the characteristics of big data and smart grid data.  ...  Many schemes are proposed to make encrypted data searchable based on keywords.  ... 
doi:10.31142/ijtsrd10991 fatcat:uay47xnawjci5fs6e6wrlf34si

The Locality of Searchable Symmetric Encryption [chapter]

David Cash, Stefano Tessaro
2014 Lecture Notes in Computer Science  
Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N ) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme must  ...  This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE).  ...  Part of this work was done when the second author was with MIT CSAIL, partially supported by NSF Contract CCF-1018064.  ... 
doi:10.1007/978-3-642-55220-5_20 fatcat:uzn7k3hxjrhyxbjxr45af6jsbq


Hung Dang, Ee-Chien Chang
2015 Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis - GeoPrivacy'15  
Our solution is conceptualized based on several state-of-the-art privacy preserving techniques such as data obfuscation, space encoding and private information retrieval (PIR).  ...  Moreover, PrAd enables a correct billing mechanism among involved parties without revealing any individual sensitive information.  ...  Security PrAd satisfies all three security metrics discussed in section 2, and thus offers strong location privacy.  ... 
doi:10.1145/2830834.2830839 dblp:conf/gis/DangC15 fatcat:ig6lzrapavbehn7qt3ujxps4je

Hiding Tree Structured Data and Queries from Untrusted Data Stores

Ping Lin, K. Selçuk Candan
2005 Information Systems Security  
Without enough security guarantees, data stores cannot survive.  ...  The set of white points depicts experiments with efficient hardware encryption/decryption.  ... 
doi:10.1201/1086.1065898x/45528.14.4.20050901/90085.3 fatcat:dglrdtxfyrd4xa5uvzptnkmxgm

Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets [article]

Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang
2021 arXiv   pre-print
This paper proposes a system, entitled Concealer that allows sharing time-varying spatial data (e.g., as produced by sensors) in encrypted form to an untrusted third-party service provider to provide location-based  ...  of SSE in large scale deployments, and (ii) it avoids information leakages based on the output-size, which may leak data distributions.  ...  Given that data is encrypted by DP and is hosted at SP, the user needs to formulate the query to enable SP to execute it over encrypted data.  ... 
arXiv:2102.05238v1 fatcat:ciolzckxwzdt3eyqq4ch2baojy
« Previous Showing results 1 — 15 out of 656 results