A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fuzzy Keywords enabled Ranked Searchable Encryption Scheme for a Public Cloud Environment
2018
Computer Communications
This paper presents a novel ranked searchable encryption scheme that addresses this issue by supporting fuzzy keywords. ...
The proposed construction is deployed on the British Telecommunication's public Cloud architecture and evaluated over a real-life speech corpus. ...
It may be observed that the proposed scheme does not require a relational database, therefore, the masking function can be strengthened by using OPE. ...
doi:10.1016/j.comcom.2018.08.004
fatcat:tmyy6hvj4jfo5hyut7we456m3i
Efficient Regular Language Search for Secure Cloud Storage
2019
IJARCCE
Searchable encryption could provide the functions of confidentiality protection and privacy-preserving data retrieval, which is an important tool for secure storage. ...
So they propose a novel concept called public-key encryption with fuzzy keyword search (PEFKS), by which the un-trusted server only obtains the fuzzy search trapdoor instead of the exact search trapdoor ...
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack This paper studies to avoid keyword guessing attack. ...
doi:10.17148/ijarcce.2019.8243
fatcat:7ly3gbyos5h6dchsltye6y5pb4
Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds
2020
International Journal of Advanced Computer Science and Applications
A hybrid cloud is a mix of both private and public clouds proposed for the storage of health data. Carefully distributing data between private and public clouds to provide protection. ...
Cloud performs some encrypted database operations to send to it and returns the output to the database owner. ...
Fuzzy keyword search is suggested along with fine-grained access control of encrypted data. ...
doi:10.14569/ijacsa.2020.0111047
fatcat:w5oqokj23jctpe4culdtcn6nmi
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
2018
Symmetry
Abstract: Cloud computing is intensifying the necessity for searchable encryption (SE) for data protection in cloud storage. ...
However, due to the smaller size of the keyword space, SEs using a public key are susceptible to a Keyword Guessing Attack (KGA) and other statistical information leakage. ...
We used Request for Comments database (RFC) similar to Fu et al.'s scheme [37] . ...
doi:10.3390/sym10050161
fatcat:54sj7kjezbf5xachvgklwuwttq
A Survey of Provably Secure Searchable Encryption
2014
ACM Computing Surveys
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption ...
In a public key encryption (PKE) scheme, the private key decrypts all messages encrypted under the corresponding public key. ...
Fuzzy search using Edit distance. ...
doi:10.1145/2636328
fatcat:3ho3qfcufjhopgigvlvh7qwkem
Efficient Data Retrieval and Fine Grained Access Control on Secure Hybrid Cloud
2020
International Journal of Emerging Trends in Engineering Research
Hybrid cloud is a model which is a combination of both private and public clouds. This model is proposed as a way of storing healthcare data. ...
The retrieval data passed from cloud to user end is masked with simple transformation. ...
Fuzzy keyword search, in addition to fine grained access control scheme, is proposed over encrypted data. ...
doi:10.30534/ijeter/2020/258102020
fatcat:3mqef23b7fc67pyzlzwrz3g22y
New Secure Concurrecy Manegment Approach For Distributed And Concurrent Access Of Encrypted Cloud Databases Using Dbaas
2015
Zenodo
the database structure. ...
Many alternatives sys tems exist for storage services,but the data confi dentiality in the database as a service paradigm are still immature. ...
CONCLUSION We propose innovative system architecture that achieving confidentiality with integrity of data stored in public cloud databases. ...
doi:10.5281/zenodo.1473218
fatcat:gcglipkyfrekdfvmtg6pyy4mwa
Identification with Encrypted Biometric Data
[article]
2009
arXiv
pre-print
This is the first non-trivial identification scheme dealing with fuzziness and encrypted data. ...
Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns. ...
For that purpose, we need to find a way to: • mitigate the effects of biometrics fuzziness, • and efficiently identify someone over an encrypted database. ...
arXiv:0901.1062v2
fatcat:voycnygkmfgtpewub526bpsp6i
Query-Biased Preview over Outsourced and Encrypted Data
2013
The Scientific World Journal
Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted ...
A generalization for symmetric searchable encryption was introduced in [12] . Another type of searchable encryption schemes is public-key based. ...
References [20] [21] [22] introduced fuzzy keyword search over encrypted data. Similar to fuzzy keyword search but different, [23, 24] introduced similarity search over encrypted data. ...
doi:10.1155/2013/860621
pmid:24078798
pmcid:PMC3775409
fatcat:3eyx3wwz2vewznfazbdi6os7sy
Indexing Encrypted Documents for Supporting Efficient Keyword Search
[chapter]
2012
Lecture Notes in Computer Science
Peng Xu et al. [9] proposed Public-Key Encryption
PEFKS with Fuzzy Keyword Search, in this client
makes fluffy catchphrase trapdoor Tw and correct
watchword trapdoor Kw for W. ...
Rhee et al., "Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010. ...
doi:10.1007/978-3-642-32873-2_7
fatcat:db5clyueznbatnamncxj5ftwju
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
2016
IEEE Transactions on Information Forensics and Security
Our security and performance analysis show that the proposed system is provably secure and more efficient than some public key searchable systems with high expressiveness. ...
A major advantage of our new primitive compared to the existing public key based search systems is that it supports an extreme expressive search mode, regular language search. ...
Most of existing public key based searchable encryption cannot hold against offiline keyword-guessing attacks. ...
doi:10.1109/tifs.2016.2581316
fatcat:gvf4wglnqjhahbva5qfnjsflr4
Text Retrieval Online: Historical Perspective on Web Search Engines
2005
Bulletin of the American Society for Information Science and Technology
Search Capabilities The goal of a search capability is to match a user's specified information need with items in a database that will answer it. ...
It is worth noting also that many of these search features had been conceptualized a decade or so earlier and used in serial searching of databases on magnetic tape. ...
Elimination of stop words speeds retrieval by making some words not searchable. ...
doi:10.1002/bult.89
fatcat:32aqv7kbrjhmhhd2hiwyxoq2le
Routes for breaching and protecting genetic privacy
[article]
2013
arXiv
pre-print
Websites such as Mitosearch.org and GedMatch.com run open searchable databases for matching mitochondrial and autosomal genotypes, respectively. ...
Auxiliary information: this column refers to the level of existing reference databases for the US population in public resources. ...
arXiv:1310.3197v1
fatcat:guexdcofhbhmfi2wblenbno5ni
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions
2019
IEEE Access
encryption), CP-ABE (ciphertext policy attribute-based encryption), access structure, revocation mechanism, multiauthority, fine-grained, trace mechanism, proxy re-encryption(PRE), hierarchical encryption, searchable ...
Reference [99] deployed a dynamic symmetric searchable encryption scheme in databases. Although it shows progressive better performance than previous work, it also leaks more information. ...
Reference [105] proposed a new fuzzy keyword search scheme. ...
doi:10.1109/access.2019.2946185
fatcat:tbg5a25f5rd3je4mogemegrvje
Routes for breaching and protecting genetic privacy
[article]
2013
bioRxiv
pre-print
Websites such as Mitosearch.org and GedMatch.com run open searchable databases for matching mitochondrial and autosomal genotypes, respectively. ...
Following the original Homer et al. study, the NIH and other data custodians moved their GWAS summary statistic data from public databases to access controlled databases such as dbGAP 70 . ...
doi:10.1101/000042
fatcat:gnmdq2mc2be7phgvcejoxu5clq
« Previous
Showing results 1 — 15 out of 286 results