4,148 Hits in 4.7 sec

Privacy Preserving Delegated Word Search in the Cloud

Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2014 Proceedings of the 11th International Conference on Security and Cryptography  
In this paper, we address the problem of privacy preserving delegated word search in the cloud.  ...  We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users.  ...  CONCLUSION We introduced a protocol for privacy preserving delegated word search in the cloud.  ... 
doi:10.5220/0005054001370150 dblp:conf/secrypt/ElkhiyaouiOM14 fatcat:embluh4hdnbbzem3tgqrr2oxve

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

Zhiguo Wan, Robert H. Deng
2016 IEEE Transactions on Dependable and Secure Computing  
In this work we investigate verifiability for privacy-preserving multi-keyword search over outsourced documents.  ...  To fulfill these requirements, we design a Verifiable Privacy-preserving keyword Search scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword  ...  ACKNOWLEDGMENTS This work was supported by the National Natural Science Foundation of China under Grant 61370027.  ... 
doi:10.1109/tdsc.2016.2635128 fatcat:ps54mbewdjcr5nazgehwrlg7aq

A Review: A Survey on Privacy Preserving for Secure Cloud Storage

Areeba Kazim, Ritika Varshney
2019 International Journal of Computer Applications  
Therefore, various measures can be adopted for maintaining data integrity, security while entering data in cloud.  ...  Storage service allows its users to outsource large amount of data without directly controlling it and cloud running on the principle of virtually shared servers do not provide users with the storage location  ...  Based on symmetric predicate encryption this Theory consists of searches like: unencryptable delegated search and revocable delegated search.  ... 
doi:10.5120/ijca2019919515 fatcat:zjhxsmnzfvgkndr5iwqbwtf2yu

Smart Search over Enciphered Data for Cloud Computing: A Survey

Sarvesh Kher
2019 International Journal for Research in Applied Science and Engineering Technology  
The concept of searchable encryption provides a promising direction in solving the privacy problem when outsourcing data to the cloud.  ...  Such schemes allow users to store their data in an encrypted format an untrusted server and then delegate the server to search on their behalf by issuing a trapdoor (i.e. encrypted keyword).  ...  The [7] paper discuss the matter of privacy-preserving top-k keyword similarity search over outsourced cloud knowledge.  ... 
doi:10.22214/ijraset.2019.1132 fatcat:2mna2mhvvbeezgmt2i2jhinoyy

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments.  ...  We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  Privacy-Preserving Cloud Data Access. User privacy in cloud services includes identity privacy, query privacy, and access pattern privacy.  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data

Akash Tidke
2021 International Journal for Research in Applied Science and Engineering Technology  
In this paper we present a survey on keyword based searching algorithms. Various searching techniques are used for retrieving the encrypted data from cloud servers.  ...  It concludes that till now multi-keyword ranked search MRSE scheme is the best methodology for searching the encrypted data.  ...  Secure Privacy Preserving Keyword Search Secure Privacy Preserving Keyword Search (SPKS) grants cloud service provider to decrypt the info and return file containing keywords [9] .  ... 
doi:10.22214/ijraset.2021.35184 fatcat:ars7ok7ifberxb3fl2juaoz7pu

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud [chapter]

Julien Bringer, Beatriz Gallego, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo
2015 Communications in Computer and Information Science  
The TREDISEC project aims at increasing trust in cloud computing by designing new security primitives ensuring data security and user privacy and supporting the underlying storage and computation technology  ...  While the revolutionary cloud computing paradigm offers substantial benefits to businesses, recent data breaches and the lack of dedicated end-to-end security solutions refrain the rapid adoption of this  ...  Acknowledgments This work was supported by the TREDISEC project (G.A. no 644412), funded by the European Union (EU) under the Information and Communication Technologies (ICT) theme of the Horizon 2020  ... 
doi:10.1007/978-3-319-27164-4_14 fatcat:dssol257ajfqrdgopqnumzdkty

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Rubin Thottupurathu Jose, Sojan Lal Poulose
2021 Advances in Science, Technology and Engineering Systems  
The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies.  ...  These documents may be in the form of structured, semi-structured, or unstructured formats.  ...  in privacy preservation.  ... 
doi:10.25046/aj060244 fatcat:bgcqyxyshncwbgnguspaxhrmpe

e-Health Cloud: Privacy Concerns and Mitigation Strategies [chapter]

Assad Abbas, Samee U. Khan
2015 Medical Data Privacy Handbook  
Various approaches, such as cryptographic and non-cryptographic are used to preserve the privacy of health-data in the cloud.  ...  This chapter encompasses the recent efforts that have been made to preserve the privacy of the health-data in the cloud environment.  ...  Furthermore, the presented scheme also preserves the search pattern privacy, anonymity, and keyword privacy.  ... 
doi:10.1007/978-3-319-23633-9_15 fatcat:lz766kkhs5bqdeyo5r46n26zci

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
records (EHRs) in the cloud.  ...  A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health  ...  ACKNOWLEDGMENT The authors would like to thank Prof. Yuan Miao and Dr. Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Pourush null
2015 American Journal of Networks and Communications  
To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data uct keyword search.  ...  The search process is distributed into two steps. The leading step develops the question keyword upon warehoused database in the private cloud.  ...  .: Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data  ... 
doi:10.11648/j.ajnc.20150403.11 fatcat:l5n5ph6dfjc6nly42guzdw5b5m


Pallaty Babitha .
2014 International Journal of Research in Engineering and Technology  
The increase usage of users access has created the privacy problems in cloud computing.  ...  The proposed project is developed to support the delegation of private keys to the users. This private key is generated to subsumes Hierarchical Identity-Based Encryption.  ...  In this project the process has preserved the data privacy in cloud environment.  ... 
doi:10.15623/ijret.2014.0309025 fatcat:xqxzmohfonc3dp7abq3i5uhdmq

Authorized Private Keyword Search over Encrypted Data in Cloud Computing

Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
2011 2011 31st International Conference on Distributed Computing Systems  
In cloud computing, clients usually outsource their data to the cloud storage servers to reduce the management costs.  ...  In this paper, using online Personal Health Record (PHR) as a case study, we first show the necessity of search capability authorization that reduces the privacy exposure resulting from the search results  ...  This work was supported in part by the US National Science Foundation under grants CNS-0716306, CNS-0831628, and CNS-0746977. We would like to thank Prof. Joshua. D.  ... 
doi:10.1109/icdcs.2011.55 dblp:conf/icdcs/LiYCL11 fatcat:iidjk26ux5f7fm4dpmgyacdxam

A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption

Lina Zou, Xueying Wang, Shoulin Yin
2018 International Journal of Network Security  
It can sort the results of searching and return the optimal matching files.  ...  In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed Searchable asymmetric encryption, which is useful for security and can enable  ...  Acknowledgement The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
dblp:journals/ijnsec/ZouWY18 fatcat:jgh4gpb2bzbqreba55nsnrrpoe

A review of the state of the arts in privacy and security in the eHealth cloud

Aqeel Sahi, David Lai, Yan Li
2021 IEEE Access  
., cryptography can be very expensive when it is used to preserve the privacy of health records in the cloud [43] .  ...  In addition, Re-dtPECK offers a linked word search, and can prevent guessing attacks [95] .  ...  It covers the most recent studies in this research area, and discusses the benefits and drawbacks of most important literature to help improve the security and privacy of eHealth clouds.  ... 
doi:10.1109/access.2021.3098708 fatcat:u6b4oflz2ndxtbape5becffffu
« Previous Showing results 1 — 15 out of 4,148 results