64 Hits in 8.4 sec

Security with Privacy - A Research Agenda

Elisa Bertino, Bharath Kumar Samanthula
2014 Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Due to the tremendous growth of data, the notion of big data has certainly gained momentum in recent years. Cloud computing is a key technology for storing, managing and analyzing big data.  ...  In this paper, we survey our research towards development of efficient and effective privacy-enhancing (PE) techniques for management and analysis of big data in cloud computing.  ...  APPROACHES AND RESEARCH DIRECTIONS This section discusses approaches for constructing novel PPDM and PPDA frameworks for big data in the cloud environment.  ... 
doi:10.4108/icst.collaboratecom.2014.257687 dblp:conf/colcom/BertinoS14 fatcat:phyvc6g7tjgmld6vxtkzgvwy2q

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

David Nuñez, Isaac Agudo, Javier Lopez
2017 Journal of Network and Computer Applications  
Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud.  ...  This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and  ...  Proxy re-encryption is integrated to the MapReduce paradigm for privacy-preserving Big Data processing in [63, 64] .  ... 
doi:10.1016/j.jnca.2017.03.005 fatcat:wlmfwffpwffnjhkopjuwg4yqfe

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments.  ...  Encryption for Secure Data Computation In many application scenarios, the cloud users expect to get a secure data computing service provided by powerful cloud servers. HE can meet this requirement.  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are  ...  [293] introduced a novel privacy-preserving distributed big data analytics framework for cloud-based applications using fully homomorphic encryption proposed by Brakerski et al. [249] .  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption  ...  Privacy and security are the most important issues to the popularity of cloud computing service.  ...  PROXY RE-ENCRYPTION (PRE) The attribute-based proxy re-encryption (ABPRE) scheme combines the traditional proxy re-encryption with ABE, and the user can decrypt the re-encrypted ciphertext with the associated  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing

Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
Encryption using the primitive encryption schemes is unsuitable for use in cloud environments, as data need to be decrypted first before they can be processed, resulting in the data being exposed to the  ...  Moreover, although homomorphic encryption is believed to be one of the potential solutions to allowing arbitrary computation on encrypted data, its efficiency is still an obstacle for its implementation  ...  To achieve the secure data service, the proxy re-encryption and identity based encryption are implemented.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.88 dblp:conf/IEEEcit/BaharonSL15 fatcat:snjh7ebvp5gh3cmbdgulc73p7a


Revathy Swaminathan, Arunkumar Thangavelu
2018 International Journal of Engineering & Technology  
Ensuring the privacy for the big data stored in a cloud system is one of the demanding and critical process in recent days.  ...  For this reason, different techniques have been developed in the traditional works, which intends to guarantee the privacy of the big data by implementing key generation, encryption, and anonymization  ...  Moreover, a multi-hop identity based conditional proxy re-encryption mechanism was utilized to preserve the anonymity of the sender and receiver.  ... 
doi:10.14419/ijet.v7i3.10.15613 fatcat:o35indycjzcjtfkz5paw26zo7e

Security and Privacy in Cloud Computing: A Survey [chapter]

Mahesh U. Shankarwar, Ambika V. Pawar
2015 Advances in Intelligent Systems and Computing  
Instead of only encryption or authentication, this paper suggests attribute based encryption and attribute based authentication together, during communication over the cloud for achieving better security  ...  This survey paper introduces a detailed analysis of the cloud security problem. In this paper various existing approaches related to data encryption and message authentications are discussed.  ...  Craig Gentry [33] using lattice-based cryptography, described the first plausible construction for a fully homomorphic encryption scheme.  ... 
doi:10.1007/978-3-319-12012-6_1 fatcat:qix24zhnbzagzjbtesfgmfuxpe

Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

Dr.K. Venkatachalapathy
2013 IOSR Journal of Computer Engineering  
Abstract : This paper proposed for a new authenticated access control scheme for securing data in cloud system.  ...  The media delivery phase additionally uses hop-by-hop re-encryption using pair-wise shared keys between neighboring proxy nodes in the VoIP network.  ...  Alone for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this project.  ... 
doi:10.9790/0661-0920109 fatcat:atnqdia7kbhbtghde74ong6qry

Information Flows in Encrypted Databases [article]

Kapil Vaswani, Ravi Ramamurthy, Ramarathnam Venkatesan
2016 arXiv   pre-print
In encrypted databases, sensitive data is protected from an untrusted server by encrypting columns using partially homomorphic encryption schemes, and storing encryption keys in a trusted client.  ...  However, encrypting columns and protecting encryption keys does not ensure confidentiality - sensitive data can leak during query processing due to information flows through the trusted client.  ...  In the absence of practical schemes for fully homomorphic encryption [20] , we consider a recently proposed computational model for ensuring data confidentiality based on encrypted databases and trusted  ... 
arXiv:1605.01092v1 fatcat:mqya6ch4fzdwhg7avljnhl2zsm

Cybersecurity Challenges Of IoT-enabled Smart Cities: A Survey [article]

Jiani Fan, Wenzhuo Yang, Kwok-Yan Lam
2022 arXiv   pre-print
Our current infrastructure will have to quickly adapt to handle the big data in our systems, supply interoperability for cross-functional performance, and provide the cognitive capabilities for system  ...  security challenges in IoT deployments and proposing a set of specialized security requirements for IoT-enabled smart cities; 4) providing a discussion on the potential prospect for IoT and IoT security  ...  encryption, attribute-based encryption, homomorphic encryption and searchable encryption.  ... 
arXiv:2202.05023v1 fatcat:p4f5r5elkvdfxeoas3622diovy

Privacy-Preserving Deep Learning on Machine Learning as a Service - A Comprehensive Survey

Harry Chandra Tanuwidjaja, Rakyong Choi, Seunggeun Baek, Kwangjo Kim
2020 IEEE Access  
- based MNIST Zhang19 [58] Combines probabilistic C-Means algorithm with BGV encryption for big data clustering in cloud environment Server- based eGSAD Swsn TABLE 3 . 3 Features of  ...  The method combines a probabilistic C-Means algorithm [80] with a BGV encryption scheme [12] to produce HE-based big data clustering on a cloud environment.  ... 
doi:10.1109/access.2020.3023084 fatcat:inxcd6sbhfewtkm4q3krnkx4oe

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
Finally, the third part describes advanced data security components, focusing, in particular on data privacy techniques.  ...  This deliverable introduces the processing functions for data management in the SUPERCLOUD.  ...  Proxy re-encryption In deliverable D3.1, we have shown that proxy re-encryption is a cryptographic tool that can be used to protect data, while permitting clients to share it securely.  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe

Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems

Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello
2018 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)  
However, the involvement of these brokers raises security and privacy issues as they can harvest sensitive data about subscribers.  ...  Moreover, the proposed protocol is secure against the collusion attacks between malicious brokers, publishers, and subscribers.  ...  ACKNOWLEDGEMENTS This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud), a project funded by the Ministry of Business, Innovation  ... 
doi:10.1109/trustcom/bigdatase.2018.00238 dblp:conf/trustcom/CuiBAAR18 fatcat:mrdrym5rsrbcfjccignwuthybe

Zero Trust Architecture (ZTA): A Comprehensive Survey

Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss
2022 IEEE Access  
Furthermore, we comprehensively discuss the conventional approaches to encryption, micro-segmentation, and security automation available for instantiating a ZTA.  ...  Based upon our analysis, we finally pinpoint the potential future research directions for successful realization of ZT in critical infrastructures.  ...  Given that more and more enterprises are switching towards cloud environments for saving and computing data, the importance of homomorphic encryption is becoming apparent.  ... 
doi:10.1109/access.2022.3174679 fatcat:w7c27guoqzfdffhjnpgerlnnse
« Previous Showing results 1 — 15 out of 64 results