Filters








2,032 Hits in 5.2 sec

TrustStream

Hao Yin, Chuang Lin, Feng Qiu, Xuening Liu, Dapeng Wu
2005 Proceedings of the 13th annual ACM international conference on Multimedia - MULTIMEDIA '05  
Streaming media over networks has gained renewed interest recently due to the emerging IP-TV and mobile TV.  ...  In this paper, we propose a novel secure and scalable media streaming architecture, called TrustStream.  ...  Examples include the Fine Granularity Scalability (FGS) [3] and Progressive FGS (PFGS) coding [5] .  ... 
doi:10.1145/1101149.1101208 dblp:conf/mm/YinLQLW05 fatcat:6pekiqsq7bfhvdejguxm2ze7kq

DBMask

Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino
2015 Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY '15  
DBMask is a system that implements encrypted query processing with support for complex queries and fine grained access control with create, update, delete and cryptographically enforced read (CRUD) operations  ...  DBMask proposes a novel technique that separates fine grained access control from encrypted query processing when evaluating SQL queries on encrypted data and enforces fine grained access control at the  ...  TRANSACTIONS ON DATA PRIVACY 9 (2016) DBMask: Fine-Grained Access Control on Encrypted Relational Databases  ... 
doi:10.1145/2699026.2699101 dblp:conf/codaspy/SarfrazNCB15 fatcat:dzldexth2zeidmptxro4gv4yoi

Streamforce: outsourcing access control enforcement for stream data to the clouds [article]

Tien Tuan Anh Dinh, Anwitaman Datta
2013 arXiv   pre-print
In particular, Streamforce comes with a number of secure query operators including Map, Filter, Join and Aggregate.  ...  We present Streamforce - a system allowing data owners to securely outsource their data to the cloud. The owner specifies fine-grained policies which are enforced by the cloud.  ...  In this paper, we present Streamforce -a fine-grained access control system for stream data over untrusted clouds. Streamforce is designed with three goals.  ... 
arXiv:1305.6146v2 fatcat:xrebyw3wajcohkb2vbhybwba34

Re-Encryption Scheme of Secure Data Sharing for Dynamic Groups in the Cloud

Ajit N., Sonal Fatangare
2017 International Journal of Computer Applications  
Proposed system provide guarantee for secure sharing of data files when they are outsourced with double encryption and particular security key distribution mechanism.  ...  We propose a secure re encryption scheme of data sharing scheme without assuming secure communication channel for dynamic groups in the cloud .The system provides fine grained access control for any clients  ...  That proposed scheme was based on the new concept of access control polynomial (ACP) that efficiently and effectively support full dynamics, flexible access control with fine-tuned granularity, and concealment  ... 
doi:10.5120/ijca2017914913 fatcat:6ojihyaf2jhofe2s4jsgkoegau

Attribute-based fine-grained access control with efficient revocation in cloud storage systems

Kan Yang, Xiaohua Jia, Kui Ren
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
In this paper, we design an access control framework in cloud storage systems and propose a fine-grained access control scheme based on Ciphertext-Policy Attribute-based Encryption (CP-ABE) approach.  ...  To achieve data access control on untrusted servers, traditional methods usually require the data owner to encrypt the data and deliver decryption keys to authorized users.  ...  data, which are encrypted with the previous public keys (Forward Security).  ... 
doi:10.1145/2484313.2484383 dblp:conf/ccs/YangJR13 fatcat:dnz6dv4fujhjbb43oihzbfoluu

Secure Private Key Distribution for Dynamic Groups in the Cloud

Miss. Sonali S. Goral
2018 International Journal for Research in Applied Science and Engineering Technology  
This gives the protection from the collusion attack that means user cannot get original data files even if they join with untrusted cloud.  ...  To achieve a functional and low-budget approach for sharing data within groups with group members in the cloud with not only low maintenance but also low management cost, the system can be proposed.  ...  It provides data storage with low cost and it should be available over the Internet all the time. The security is the most important factor in the cloud computing.  ... 
doi:10.22214/ijraset.2018.1256 fatcat:vrhyqu5iivajblwakfijcs22ai

MILo-DB: a personal, secure and portable database machine

Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, Yanli Guo, Lionel Le Folgoc, Shaoyi Yin
2013 Distributed and parallel databases  
Mass-storage secure portable tokens are emerging and provide a real breakthrough in the management of sensitive data.  ...  They can embed personal data and/or metadata referencing documents stored encrypted in the Cloud and can manage them under holder's control.  ...  Granularity of encryption primitives: LCs are written sequentially at flash page granularity, pushing for computing the MAC at that granularity to minimize the storage overhead.  ... 
doi:10.1007/s10619-012-7119-x fatcat:2lng4vqjx5fbpbfaiga5kmej2y

A Cloud design for user-controlled storage and processing of sensor data

Rene Hummen, Martin Henze, Daniel Catrein, Klaus Wehrle
2012 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings  
However, sensor data often contains privacy-relevant or otherwise sensitive information. For current Cloud platforms, the data owner looses control over her data once it enters the Cloud.  ...  Ubiquitous sensing environments such as sensor networks collect large amounts of data. This data volume is destined to grow even further with the vision of the Internet of Things.  ...  The responsibility for the content of this publication lies with the authors.  ... 
doi:10.1109/cloudcom.2012.6427523 dblp:conf/cloudcom/HummenHCW12 fatcat:sxuzusm2kvbk3ef5xwmqfmje2e

Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks

Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal
2012 2012 21st International Conference on Computer Communications and Networks (ICCCN)  
Furthermore, we propose an effective and flexible security mechanism that guarantees confidentiality, integrity as well as fine grained access control to outsourced medical data.  ...  These challenges include scalability, availability and security.  ...  These access structures enable us to select with fine granularity which users can access to the symmetric key of a given file.  ... 
doi:10.1109/icccn.2012.6289252 dblp:conf/icccn/LounisHBC12 fatcat:ckq7fz7q5ncn7eiiyh2ottrb4e

Enforcing Privacy in Cloud Databases [article]

Somayeh Sobati Moghadam, Gérald Gavin
2017 arXiv   pre-print
aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges.  ...  However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that  ...  They are stored along with encrypted tuples. Such indexing allows exact match, range (if data order is preserved) and join queries, but also induce false positives in query answers.  ... 
arXiv:1708.09171v1 fatcat:stvwiwy3b5bo5gdxmxcv3w46pm

Private Buddy Search: Enabling Private Spatial Queries in Social Networks

Ali Khoshgozaran, Cyrus Shahabi
2009 2009 International Conference on Computational Science and Engineering  
Utilizing server side encrypted index structures and client side query processing, PBS enjoys both scalability and privacy.  ...  However, issues of trust, security and privacy have hindered the popularity and safety of the systems developed for this purpose.  ...  Results for t join and t track were averaged over 1K requests.  ... 
doi:10.1109/cse.2009.337 dblp:conf/cse/KhoshgozaranS09 fatcat:o36wr2mhjfhufnyultxi75tcvu

Secure deletion from inverted indexes on compliance storage

Soumyadeb Mitra, Marianne Winslett
2006 Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06  
Since most of the modern WORM devices are built on top of magnetic media, they also support a secure deletion operation by associating expiration time with files.  ...  Secure retention, however, is only a part of a document's lifecycle: It is often crucial to delete documents after its mandatory retention period is over.  ...  To prevent join attacks, the document ID is XORED with the hash of the keyword before encryption.  ... 
doi:10.1145/1179559.1179572 dblp:conf/storagess/MitraW06 fatcat:bx73dztmlvh3nilkc5cuz2blfe

A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks

Mingsheng Cao, Luhan Wang, Zhiguang Qin, Chunwei Lou
2019 Wireless Communications and Mobile Computing  
To resolve these issues, in this paper, we propose a lightweight fine-grained search over encrypted data in WBANs by employing ciphertext policy attribute based encryption and searchable encryption technologies  ...  However, security and privacy preserving of the collected data is a major challenge on resource-limited WBANs devices and the urgent need for fine-grained search and lightweight access.  ...  Conclusion In this paper, a lightweight search with fine-granularity over encrypted data in WBANs is proposed.  ... 
doi:10.1155/2019/9340808 fatcat:p6x7if5n7rd3te3c5vlfrzflj4

Supporting flexible streaming media protection through privacy-aware secure processors

Youtao Zhang, Jun Yang, Lan Gao
2009 Computers & electrical engineering  
The research in the computer architecture community has shown that secure processors can help to defend various types of attacks such as those with a hijacked and malicious OS.  ...  However existing designs focus on securing point-to-point data transfers and face both privacy and performance issues when supporting group-oriented applications e.g. video ondemand.  ...  Under the fine-granular billing plan, a user may join and leave the user group freely at which point the server needs to update its keys.  ... 
doi:10.1016/j.compeleceng.2008.06.001 fatcat:6dgl2nl4njhhzmeqgrpgbg7wry

A Secure and Efficient Multi Authority Encryption Scheme in Cross Domain Data Sharing

2020 International Journal of Engineering and Advanced Technology  
Taking care of the patient records on suspicious limit makes secure transfer of data to be a test issue.  ...  the basic troubles for cryptographic technique fuse at a proportional time achieving structure flexibility and fine-grained data get the opportunity to manage, gainful key or customer the load up, data  ...  For fine grained get the chance to oversee the new encryption techniques are used.  ... 
doi:10.35940/ijeat.d8439.049420 fatcat:3tlf6fnkv5ci7o6zessjdrn35y
« Previous Showing results 1 — 15 out of 2,032 results