A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy Preserving Delegated Word Search in the Cloud
2014
Proceedings of the 11th International Conference on Security and Cryptography
In this paper, we address the problem of privacy preserving delegated word search in the cloud. ...
We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users. ...
CONCLUSION We introduced a protocol for privacy preserving delegated word search in the cloud. ...
doi:10.5220/0005054001370150
dblp:conf/secrypt/ElkhiyaouiOM14
fatcat:embluh4hdnbbzem3tgqrr2oxve
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
2016
IEEE Transactions on Dependable and Secure Computing
In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced documents. ...
To fulfill these requirements, we design a Verifiable Privacy-preserving keyword Search scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword ...
ACKNOWLEDGMENTS This work was supported by the National Natural Science Foundation of China under Grant 61370027. ...
doi:10.1109/tdsc.2016.2635128
fatcat:ps54mbewdjcr5nazgehwrlg7aq
A Review: A Survey on Privacy Preserving for Secure Cloud Storage
2019
International Journal of Computer Applications
Therefore, various measures can be adopted for maintaining data integrity, security while entering data in cloud. ...
Storage service allows its users to outsource large amount of data without directly controlling it and cloud running on the principle of virtually shared servers do not provide users with the storage location ...
Based on symmetric predicate encryption this Theory consists of searches like: unencryptable delegated search and revocable delegated search. ...
doi:10.5120/ijca2019919515
fatcat:zjhxsmnzfvgkndr5iwqbwtf2yu
Smart Search over Enciphered Data for Cloud Computing: A Survey
2019
International Journal for Research in Applied Science and Engineering Technology
The concept of searchable encryption provides a promising direction in solving the privacy problem when outsourcing data to the cloud. ...
Such schemes allow users to store their data in an encrypted format an untrusted server and then delegate the server to search on their behalf by issuing a trapdoor (i.e. encrypted keyword). ...
The [7] paper discuss the matter of privacy-preserving top-k keyword similarity search over outsourced cloud knowledge. ...
doi:10.22214/ijraset.2019.1132
fatcat:2mna2mhvvbeezgmt2i2jhinoyy
Ensuring Security and Privacy Preservation for Cloud Data Services
2016
ACM Computing Surveys
Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments. ...
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access ...
Privacy-Preserving Cloud Data Access. User privacy in cloud services includes identity privacy, query privacy, and access pattern privacy. ...
doi:10.1145/2906153
fatcat:c57iz6lswvfxbmhireksha35vm
A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data
2021
International Journal for Research in Applied Science and Engineering Technology
In this paper we present a survey on keyword based searching algorithms. Various searching techniques are used for retrieving the encrypted data from cloud servers. ...
It concludes that till now multi-keyword ranked search MRSE scheme is the best methodology for searching the encrypted data. ...
Secure Privacy Preserving Keyword Search Secure Privacy Preserving Keyword Search (SPKS) grants cloud service provider to decrypt the info and return file containing keywords [9] . ...
doi:10.22214/ijraset.2021.35184
fatcat:ars7ok7ifberxb3fl2juaoz7pu
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
[chapter]
2015
Communications in Computer and Information Science
The TREDISEC project aims at increasing trust in cloud computing by designing new security primitives ensuring data security and user privacy and supporting the underlying storage and computation technology ...
While the revolutionary cloud computing paradigm offers substantial benefits to businesses, recent data breaches and the lack of dedicated end-to-end security solutions refrain the rapid adoption of this ...
Acknowledgments This work was supported by the TREDISEC project (G.A. no 644412), funded by the European Union (EU) under the Information and Communication Technologies (ICT) theme of the Horizon 2020 ...
doi:10.1007/978-3-319-27164-4_14
fatcat:dssol257ajfqrdgopqnumzdkty
Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique
2021
Advances in Science, Technology and Engineering Systems
The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. ...
These documents may be in the form of structured, semi-structured, or unstructured formats. ...
in privacy preservation. ...
doi:10.25046/aj060244
fatcat:bgcqyxyshncwbgnguspaxhrmpe
e-Health Cloud: Privacy Concerns and Mitigation Strategies
[chapter]
2015
Medical Data Privacy Handbook
Various approaches, such as cryptographic and non-cryptographic are used to preserve the privacy of health-data in the cloud. ...
This chapter encompasses the recent efforts that have been made to preserve the privacy of the health-data in the cloud environment. ...
Furthermore, the presented scheme also preserves the search pattern privacy, anonymity, and keyword privacy. ...
doi:10.1007/978-3-319-23633-9_15
fatcat:lz766kkhs5bqdeyo5r46n26zci
Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing
2019
IEEE Access
records (EHRs) in the cloud. ...
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health ...
ACKNOWLEDGMENT The authors would like to thank Prof. Yuan Miao and Dr. Hui Cui for their valuable comments, suggestions and reviews. ...
doi:10.1109/access.2019.2919982
fatcat:3sawv3nb5ndnncdzzk5q2anuwq
Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
2015
American Journal of Networks and Communications
To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data uct keyword search. ...
The search process is distributed into two steps. The leading step develops the question keyword upon warehoused database in the private cloud. ...
.: Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data ...
doi:10.11648/j.ajnc.20150403.11
fatcat:l5n5ph6dfjc6nly42guzdw5b5m
MEASURABLE, SAFE AND SECURE DATA MANAGEMENT FOR SENSITIVE USERS IN CLOUD COMPUTING
2014
International Journal of Research in Engineering and Technology
The increase usage of users access has created the privacy problems in cloud computing. ...
The proposed project is developed to support the delegation of private keys to the users. This private key is generated to subsumes Hierarchical Identity-Based Encryption. ...
In this project the process has preserved the data privacy in cloud environment. ...
doi:10.15623/ijret.2014.0309025
fatcat:xqxzmohfonc3dp7abq3i5uhdmq
Authorized Private Keyword Search over Encrypted Data in Cloud Computing
2011
2011 31st International Conference on Distributed Computing Systems
In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs. ...
In this paper, using online Personal Health Record (PHR) as a case study, we first show the necessity of search capability authorization that reduces the privacy exposure resulting from the search results ...
This work was supported in part by the US National Science Foundation under grants CNS-0716306, CNS-0831628, and CNS-0746977. We would like to thank Prof. Joshua. D. ...
doi:10.1109/icdcs.2011.55
dblp:conf/icdcs/LiYCL11
fatcat:iidjk26ux5f7fm4dpmgyacdxam
A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption
2018
International Journal of Network Security
It can sort the results of searching and return the optimal matching files. ...
In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed Searchable asymmetric encryption, which is useful for security and can enable ...
Acknowledgement The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
dblp:journals/ijnsec/ZouWY18
fatcat:jgh4gpb2bzbqreba55nsnrrpoe
A review of the state of the arts in privacy and security in the eHealth cloud
2021
IEEE Access
., cryptography can be very expensive when it is used to preserve the privacy of health records in the cloud [43] . ...
In addition, Re-dtPECK offers a linked word search, and can prevent guessing attacks [95] . ...
It covers the most recent studies in this research area, and discusses the benefits and drawbacks of most important literature to help improve the security and privacy of eHealth clouds. ...
doi:10.1109/access.2021.3098708
fatcat:u6b4oflz2ndxtbape5becffffu
« Previous
Showing results 1 — 15 out of 4,148 results