Filters








12,817 Hits in 7.0 sec

Efficient Multi-User Indexing for Secure Keyword Search

Eirini C. Micheli, Giorgos Margaritis, Stergios V. Anastasiadis
2014 International Conference on Extending Database Technology  
Lethe clusters together documents with similar sets of authorized users, and only creates shared indices for configurable volumes of documents with common users.  ...  We introduce the Lethe indexing workflow to improve query and update e ciency in secure keyword search.  ...  A di↵erent secure solution partitions the document collection by search permissions, and maintains a separate index for each partition [13] .  ... 
dblp:conf/edbt/MicheliMA14 fatcat:qwnuwhrmdzashbcdg4m5xbuqgu

Lethe: Cluster-Based Indexing for Secure Multi-user Search

Eirini C. Micheli, Giorgos Margaritis, Stergios V. Anastasiadis
2014 2014 IEEE International Congress on Big Data  
The Lethe workflow clusters together documents with similar sets of authorized users, and creates shared indices for configurable document subsets accessible by the same users.  ...  We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search.  ...  Accordingly, we build a separate index for each document subset with common access permissions. We examine secure search in multi-user environments without special consideration of encrypted storage.  ... 
doi:10.1109/bigdata.congress.2014.54 dblp:conf/bigdata/MicheliMA14 fatcat:r5mpmornrbdg3ltrvz2r2gvoiu

A solution for secure use of Kibana and Elasticsearch in multi-user environment [article]

Wataru Takase, Tomoaki Nakamura, Yoshiyuki Watase, Takashi Sasaki
2017 arXiv   pre-print
based on user/group, and contribution to Search Guard which is an Elasticsearch plugin enabling user/group based access control.  ...  Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine.  ...  SUMMARY For secure use of Kibana and Elasticsearch, this paper provides a solution which enables user/group based access restriction and Kibana object separation in multi-user environment.  ... 
arXiv:1706.10040v1 fatcat:jai3bkjvmjcq3m5aqkh6u4efce

Security Aware Partitioning for efficient file system search

Aleatha Parker-Wood, Christina Strong, Ethan L. Miller, Darrell D. E. Long
2010 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)  
Also, in a large file system that contains many users, a user's search should not include confidential files the user doesn't have permission to view.  ...  Index partitioning techniques-where indexes are broken into multiple distinct sub-indexes-are a proven way to improve metadata search speeds and scalability for large file systems, permitting early triage  ...  We also thank the industrial sponsors of the SSRC, including NetApp, IBM, Symantec, and LSI for their generous support, and NetApp in particular for generously making data sets available to us.  ... 
doi:10.1109/msst.2010.5496990 dblp:conf/mss/Parker-WoodSML10 fatcat:gv4tchyztjhqff7abjbfu2sfmu

Research on Smart City Double-link Data Storage and Sharing Model based on Alliance Chain

2021 Academic Journal of Engineering and Technology Science  
The off-chain database uses the Hadoop Distributed File System (HDFS) distributed file system based on mean shift clustering to store data, which improves the storage and access rate of the data.  ...  The proposed model has good efficiency, security, and accuracy, and can effectively improve the problems existing in smart city data security management.  ...  In order to solve this problem, a multi-layer index HDFS scheme based on mean shift clustering is proposed.  ... 
doi:10.25236/ajets.2021.040201 fatcat:wnxjtn3gmvf4rnzntpbldhmx7u

An Extended Video Database Model for Supporting Finer-Grained Multi-Policy and Multi-Level Access Controls

Nguyen Anh Thy Tran, Tran Khanh Dang
2008 POLIBITS Research Journal on Computer Science and Computer Engineering With Applications  
The growing amount of multimedia data available to the average user has reached a critical phase, where methods for indexing, searching, and efficient retrieval are needed to manage the information overload  ...  Also, we give users more solutions to query for videos based on the video contents using annotations.  ...  We believe the proposed semantic clustering technique and cluster-based hierarchical indexing structure would be very suitable for such fast browsing. C.  ... 
doi:10.17562/pb-38-6 fatcat:h6gkqksoczf7pdthjwq6p7lnce

Design and development of multi-tenant web framework

Sivakumar Kuppusamy, Devi Thirupathi, Vivekanandan Kaniappan
2018 International Journal of Services Technology and Management  
MWF consist of features that include authentication, authorization, tenant tracking, application platform controller and securing tenant data in shared schema.  ...  multi-tenant enabled application.  ...  MWF's enhanced security feature helps user to search the tenant data in a secured environment.  ... 
doi:10.1504/ijstm.2018.090334 fatcat:h5jn5xiwtfe2xhnk2vflsck3zy

Design and development of multi-tenant web framework

Vivekanandan Kaniappan, Devi Thirupathi, Sivakumar Kuppusamy
2018 International Journal of Services Technology and Management  
MWF consist of features that include authentication, authorization, tenant tracking, application platform controller and securing tenant data in shared schema.  ...  multi-tenant enabled application.  ...  MWF's enhanced security feature helps user to search the tenant data in a secured environment.  ... 
doi:10.1504/ijstm.2018.10011467 fatcat:wt52bkri6faahjk73nebbfsyoq

Design and Development of Multi-Tenant Web Framework

Sivakumar Kuppusamy, Vivekanandan Kaniappan, Devi Thirupathi
2015 Procedia Computer Science  
MWF consist of features that include authentication, authorization, tenant tracking, application platform controller and securing tenant data in shared schema.  ...  multi-tenant enabled application.  ...  MWF's enhanced security feature helps user to search the tenant data in a secured environment.  ... 
doi:10.1016/j.procs.2015.04.168 fatcat:vtt7vw7olbainaz5p4gdounkqa

Data Discoverability in Science Gateways at Scale using Elasticsearch Cluster Architecture

Jake Rosenberg
2022 Practice and Experience in Advanced Research Computing  
By leveraging Elasticsearch's distributed data model and role-based access control, we designed a secure search solution which has scaled to over 200 million indexed entities representing approximately  ...  For a facility managing multiple science gateway products, maintaining up-to-date search indices is a challenge.  ...  ACKNOWLEDGMENTS Thanks to Don Koehler and TACC operations for assistance in provisioning the Elasticsearch cluster, and to Maytal Dahan for providing suggestions and feedback on this manuscript.  ... 
doi:10.1145/3491418.3535170 fatcat:b6suvzqhzfbt3nzyhgva2l3nnm

Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014)

Traian Marius Truta, Li Xiong, Farshad Fotouhi
2015 Transactions on Data Privacy  
We also want to thank the reviewers of the papers for their helpful comments.  ...  Josep Domingo-Ferrer, Editors in Chief of Transactions on Data Privacy for their strong support on the organization of this special issue.  ...  Anastasiadis is titled "Permission-based Index Clustering for Secure Multi-User Search".  ... 
dblp:journals/tdp/TrutaXF15 fatcat:db3orzetabcark6v2b7zgp3tvu

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message  ...  As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection.  ...  Based on clustering algorithm, homomorphic encryption technology, and information security, in this article, the authors proposed a user behavior clustering scheme that supports automatic tags on ciphertext  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

Use of NoSQL Technology for Secure and Fast Search of Enterprise Data

Juris Rāts
2017 Baltic Journal of Modern Computing  
We create a persistence model that supports high performance search in large volumes of unstructured data in accordance with user access rights. The model is based on two level data store.  ...  NoSQL solutions are used for search in large data volumes of unstructured data, mostly for the search of the public data (e.g. Google search).  ...  indexed with data access attributes at index time;  User access attributes have to be calculated (e.g., out of the roles and permissions assigned to the user) at user login time; Rāts  Search criteria  ... 
doi:10.22364/bjmc.2017.5.2.01 fatcat:iqkcimlfu5fvnioygoj6y3ux54

A blockchain-assisted framework for secure and reliable data sharing in distributed systems

Yu Guo, Shenling Wang, Jianhui Huang
2021 EURASIP Journal on Wireless Communications and Networking  
Besides, we devise a secure local index framework to support encrypted keyword search with forward privacy and mitigate blockchain overhead.  ...  By leveraging smart contracts of blockchain, a data owner can distribute secret keys for authorized users without extra round interaction to generate the permitted search tokens.  ...  Acknowledgements This work was supported by the Fundamental Research Funds for the Central Universities under Grants 310421108 and National Key R&D Program of China (No. 2019YFB2102600).  ... 
doi:10.1186/s13638-021-02041-y fatcat:yutmlywayzbk5koxd7tuegx42e

Access Control Role Evolution Mechanism for Open Computing Environment

Aodi Liu, Xuehui Du, Na Wang
2020 Electronics  
In addition, a role relationship aggregation algorithm is proposed to realize the clustering of roles, which provides a supplementary reference for the security administrator to give the role real semantic  ...  Therefore, the user-permission relationship of open computing environments has a huge scale and will be dynamically adjusted over time, which enables effective permission management in the role based access  ...  The multi-dimensional mixed evaluation index is used to guide the role mining process, so that the security and availability of system can be considered at the same time.  ... 
doi:10.3390/electronics9030517 fatcat:rih3fd4rm5h7xddza6kqa7zgyu
« Previous Showing results 1 — 15 out of 12,817 results