Filters








286 Hits in 3.0 sec

Fuzzy Keywords enabled Ranked Searchable Encryption Scheme for a Public Cloud Environment

Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan
2018 Computer Communications  
This paper presents a novel ranked searchable encryption scheme that addresses this issue by supporting fuzzy keywords.  ...  The proposed construction is deployed on the British Telecommunication's public Cloud architecture and evaluated over a real-life speech corpus.  ...  It may be observed that the proposed scheme does not require a relational database, therefore, the masking function can be strengthened by using OPE.  ... 
doi:10.1016/j.comcom.2018.08.004 fatcat:tmyy6hvj4jfo5hyut7we456m3i

Efficient Regular Language Search for Secure Cloud Storage

Karthikeyan B, Vishaal S, Ajithkumar P
2019 IJARCCE  
Searchable encryption could provide the functions of confidentiality protection and privacy-preserving data retrieval, which is an important tool for secure storage.  ...  So they propose a novel concept called public-key encryption with fuzzy keyword search (PEFKS), by which the un-trusted server only obtains the fuzzy search trapdoor instead of the exact search trapdoor  ...  Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack This paper studies to avoid keyword guessing attack.  ... 
doi:10.17148/ijarcce.2019.8243 fatcat:7ly3gbyos5h6dchsltye6y5pb4

Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds

Sridhar Reddy Vulapula, Srinivas Malladi
2020 International Journal of Advanced Computer Science and Applications  
A hybrid cloud is a mix of both private and public clouds proposed for the storage of health data. Carefully distributing data between private and public clouds to provide protection.  ...  Cloud performs some encrypted database operations to send to it and returns the output to the database owner.  ...  Fuzzy keyword search is suggested along with fine-grained access control of encrypted data.  ... 
doi:10.14569/ijacsa.2020.0111047 fatcat:w5oqokj23jctpe4culdtcn6nmi

Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme

M Ahsan, Mohd Idna Bin Idris, Ainuddin Bin Abdul Wahab, Ihsan Ali, Nawsher Khan, Mohammed Al-Garwi, Atiq Rahman
2018 Symmetry  
Abstract: Cloud computing is intensifying the necessity for searchable encryption (SE) for data protection in cloud storage.  ...  However, due to the smaller size of the keyword space, SEs using a public key are susceptible to a Keyword Guessing Attack (KGA) and other statistical information leakage.  ...  We used Request for Comments database (RFC) similar to Fu et al.'s scheme [37] .  ... 
doi:10.3390/sym10050161 fatcat:54sj7kjezbf5xachvgklwuwttq

A Survey of Provably Secure Searchable Encryption

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
2014 ACM Computing Surveys  
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption  ...  In a public key encryption (PKE) scheme, the private key decrypts all messages encrypted under the corresponding public key.  ...  Fuzzy search using Edit distance.  ... 
doi:10.1145/2636328 fatcat:3ho3qfcufjhopgigvlvh7qwkem

Efficient Data Retrieval and Fine Grained Access Control on Secure Hybrid Cloud

2020 International Journal of Emerging Trends in Engineering Research  
Hybrid cloud is a model which is a combination of both private and public clouds. This model is proposed as a way of storing healthcare data.  ...  The retrieval data passed from cloud to user end is masked with simple transformation.  ...  Fuzzy keyword search, in addition to fine grained access control scheme, is proposed over encrypted data.  ... 
doi:10.30534/ijeter/2020/258102020 fatcat:3mqef23b7fc67pyzlzwrz3g22y

New Secure Concurrecy Manegment Approach For Distributed And Concurrent Access Of Encrypted Cloud Databases Using Dbaas

Mr.Satish.C.Cholke, Prof.S.B.Natikar
2015 Zenodo  
the database structure.  ...  Many alternatives sys tems exist for storage services,but the data confi dentiality in the database as a service paradigm are still immature.  ...  CONCLUSION We propose innovative system architecture that achieving confidentiality with integrity of data stored in public cloud databases.  ... 
doi:10.5281/zenodo.1473218 fatcat:gcglipkyfrekdfvmtg6pyy4mwa

Identification with Encrypted Biometric Data [article]

Julien Bringer, Herve Chabanne, Bruno Kindarji
2009 arXiv   pre-print
This is the first non-trivial identification scheme dealing with fuzziness and encrypted data.  ...  Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns.  ...  For that purpose, we need to find a way to: • mitigate the effects of biometrics fuzziness, • and efficiently identify someone over an encrypted database.  ... 
arXiv:0901.1062v2 fatcat:voycnygkmfgtpewub526bpsp6i

Query-Biased Preview over Outsourced and Encrypted Data

Ningduo Peng, Guangchun Luo, Ke Qin, Aiguo Chen
2013 The Scientific World Journal  
Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted  ...  A generalization for symmetric searchable encryption was introduced in [12] . Another type of searchable encryption schemes is public-key based.  ...  References [20] [21] [22] introduced fuzzy keyword search over encrypted data. Similar to fuzzy keyword search but different, [23, 24] introduced similarity search over encrypted data.  ... 
doi:10.1155/2013/860621 pmid:24078798 pmcid:PMC3775409 fatcat:3eyx3wwz2vewznfazbdi6os7sy

Indexing Encrypted Documents for Supporting Efficient Keyword Search [chapter]

Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo, Sharad Mehrotra
2012 Lecture Notes in Computer Science  
Peng Xu et al. [9] proposed Public-Key Encryption PEFKS with Fuzzy Keyword Search, in this client makes fluffy catchphrase trapdoor Tw and correct watchword trapdoor Kw for W.  ...  Rhee et al., "Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010.  ... 
doi:10.1007/978-3-642-32873-2_7 fatcat:db5clyueznbatnamncxj5ftwju

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data

Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu
2016 IEEE Transactions on Information Forensics and Security  
Our security and performance analysis show that the proposed system is provably secure and more efficient than some public key searchable systems with high expressiveness.  ...  A major advantage of our new primitive compared to the existing public key based search systems is that it supports an extreme expressive search mode, regular language search.  ...  Most of existing public key based searchable encryption cannot hold against offiline keyword-guessing attacks.  ... 
doi:10.1109/tifs.2016.2581316 fatcat:gvf4wglnqjhahbva5qfnjsflr4

Text Retrieval Online: Historical Perspective on Web Search Engines

Trudi Bellardo Hahn
2005 Bulletin of the American Society for Information Science and Technology  
Search Capabilities The goal of a search capability is to match a user's specified information need with items in a database that will answer it.  ...  It is worth noting also that many of these search features had been conceptualized a decade or so earlier and used in serial searching of databases on magnetic tape.  ...  Elimination of stop words speeds retrieval by making some words not searchable.  ... 
doi:10.1002/bult.89 fatcat:32aqv7kbrjhmhhd2hiwyxoq2le

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 arXiv   pre-print
Websites such as Mitosearch.org and GedMatch.com run open searchable databases for matching mitochondrial and autosomal genotypes, respectively.  ...  Auxiliary information: this column refers to the level of existing reference databases for the US population in public resources.  ... 
arXiv:1310.3197v1 fatcat:guexdcofhbhmfi2wblenbno5ni

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption, searchable  ...  Reference [99] deployed a dynamic symmetric searchable encryption scheme in databases. Although it shows progressive better performance than previous work, it also leaks more information.  ...  Reference [105] proposed a new fuzzy keyword search scheme.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

Routes for breaching and protecting genetic privacy [article]

Yaniv Erlich, Arvind Narayanan
2013 bioRxiv   pre-print
Websites such as Mitosearch.org and GedMatch.com run open searchable databases for matching mitochondrial and autosomal genotypes, respectively.  ...  Following the original Homer et al. study, the NIH and other data custodians moved their GWAS summary statistic data from public databases to access controlled databases such as dbGAP 70 .  ... 
doi:10.1101/000042 fatcat:gnmdq2mc2be7phgvcejoxu5clq
« Previous Showing results 1 — 15 out of 286 results