3,281 Hits in 3.6 sec

Study of Dynamic Multikeyword Text Search Techniques over Encrypted Data in Cloud

Ankita Puri, Naveen Kumari
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In this paper, for the first time, we define and solve the challenging problem of privacy preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy  ...  Among various multi-keyword semantics, we choose the efficient principle of "coordinate matching", i.e., as many matches as possible, to capture the similarity between search query and data documents,  ...  [9] proposed scheme to deal with privacy preserving ranked multi-keyword search in a multi-owner model (PRMSM).  ... 
doi:10.23956/ijarcsse/v7i7/0110 fatcat:dktyjor7szchjpva4ahqlgcmce

A Multi Keyword Searchable Attribute-based Encryption Technique for Data Access Control in Cloud Storage

Prashant Mininath Mane
2020 International Journal of Advanced Trends in Computer Science and Engineering  
In this study, it includes a multi-keyword searchable attribute-based encryption technique with a cloud-based attribute update, which is a hybrid of the attribute-based encryption algorithm and multi-keyword  ...  Multi-Keyword searchable encryption process allows legitimate users to quickly identify useful data stored in a cloud server without disclosing the searched keywords relevant data.  ...  In [18] , Zhang et al. suggested a method for dealing in a multi-owner system with a stable multi-keyword ranked search.  ... 
doi:10.30534/ijatcse/2020/104942020 fatcat:6pzotrjewzex3d6iulj6xpyo3q

Secure Virtualisation Using Hash Key Authentication

D. Jegalakshmi Princy, M Shobana
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
In this work, we proposed a model which searches and get access to files which are uploaded in a network.  ...  Elliptical Curve Cryptography and Attribute Based Encryption method are implemented for secured data communication.  ...  In this paper, we propose schemes to deal with Privacy preserving Ranked Multi-keyword Search in a Multi-owner model (PRMSM).  ... 
doi:10.32628/cseit18386 fatcat:7odgmtx6ofduxba7tncphtza3i

Safe Multi Keyword Ranked Search over Encrypted Cloud Data

Pradnya H., Arti Mohanpurkar
2016 Communications on Applied Electronics  
In subsisting system, for the first instance, the conundrum of privacypreserving multi-keyword ranked search over encrypted data in cloud computing (MRSE) is define and solve.  ...  General Terms Multi keyword Rank search, MD Algorithm, vector Space Model.  ...  Verifiable Privacy Preserving Multi-keyword Text Search in cloud supporting similarity-Based Ranking, Wenhai Sun et al [2] , Secure Ranked Keyword Search over Encrypted Cloud Data, C.  ... 
doi:10.5120/cae2016652309 fatcat:6qedcs36xfaldae2gf37nk252u

Data Privacy Protection Mechanisms in Cloud

Niharika Singh, Ashutosh Kumar Singh
2017 Data Science and Engineering  
In the cloud computing environment, the privacy of the electronic data is a serious issue that requires special considerations.  ...  We also presented a comprehensive comparison of the privacy-preserving approaches from the angle of the privacy-preserving requirements' satisfaction.  ...  The paper [14] offers schemes to deal with privacy-preserving ranked multi-keyword search in a multi-owner model (PRMSM).  ... 
doi:10.1007/s41019-017-0046-0 fatcat:cb2ok5d5jbdltffawp6hvz4j6e

Multi-Keyword Search Methodology for Cloud Data

Mrs. Kavya B S, Shrilakshmi P V, Sushmitha N, Yamuna S
2017 IJARCCE  
In this paper, we motivate and solve the problem of multi-keyword ranked search on encrypted cloud data, and implement a variety of privacy requirements.  ...  We implement "coordinate matching" as an efficient searching technique to synchronize pairing of query keywords. The efficiency of the searching is improved by tree-based index structure.  ...  In such a system, the decryption of a cipher text is feasible only if the set of attributes of the user key matches the attributes of the cipher text.The problem with the public key encryption with keyword  ... 
doi:10.17148/ijarcce.2017.6422 fatcat:763amabgd5c5ralq4oaafhcwdu

Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption

Mengxi Nie, Peng Ran, HaoMiao Yang, M. Kavakli, M.J.E. Salami, A. Amini, M.A.B.M. Basri, A.B. Masli, S.C.H. Li, M. Pal
2016 MATEC Web of Conferences  
Multi-keyword ranked searching enables the data users for efficient retrieval of searched query.  ...  While accessing or sharing information stored in the cloud, the main concern is to enhance the security of data. Different encryption techniques can be used to provide strict privacy requirements.  ...  In [8] a new framework is proposed for the problem of multi-keyword ranked search over encrypted cloud data, and to establish a variety of privacy requirements.  ... 
doi:10.1051/matecconf/20165601002 fatcat:eqxwvrk2cvc5fhnzzvxiz6qrri

Enhanced Confidentiality Multi-Keyword Top-k Identical Search Over Encrypted Data

Osman Hamid,
2018 International Journal for Research in Applied Science and Engineering Technology  
and makes several ancient data analytic operators like keyword-based top-k document retrieval obsolete. during this paper, we tend to investigate the multi-keyword top-k search downside for large encoding  ...  However, information sets like health records in electronic documents sometimes contain sensitive info, that brings concerning privacy considerations if the documents area unit discharged or shared to  ...  house owners want effective, ascendible and privacypreserving services before emotional their information to the cloud. encoding has been wide used for information privacy preservation in information sharing  ... 
doi:10.22214/ijraset.2018.6113 fatcat:lvcti34xkrdpxcrfkwlkfvizny

Preserving Data Confidentiality in Cloud Computing

Mr. A. R. Gadekar
2018 International Journal for Research in Applied Science and Engineering Technology  
The security in these frameworks endures a noteworthy disadvantage when one client demands for the sharing of information of some other's client.  ...  This component includes the presence of brought together Key Distribution Center otherwise called KDC, in charge of appropriating and keeping up attributes and secret keys to its clients.  ...  to each user and some privacy preserving technology use in this paper. 5 Privacy preserving keyword searches on remote encrypted data.  ... 
doi:10.22214/ijraset.2018.1415 fatcat:rsx4yavczvgyrb57qpkoyhka5a

DABKS: Dynamic attribute-based keyword search in cloud computing

Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu
2017 2017 IEEE International Conference on Communications (ICC)  
This paper proposes a dynamic attribute-based keyword search (DABKS) scheme that incorporates proxy re-encryption (PRE) and a secret sharing scheme (SSS) into ABKS.  ...  The existing attribute-based keyword search (ABKS) scheme addresses the first problem, which allows a data owner to control the search of the outsourced encrypted data according to an access policy.  ...  [13] proposed the attribute-based keyword search (ABKS) scheme, which utilized attribute-based encryption (ABE) [14] to achieve fine-grained search authorization for public-key settings.  ... 
doi:10.1109/icc.2017.7997108 dblp:conf/icc/HuLLPWW17 fatcat:36ymgqfb2vdw5eg4gbikmyxxqq

Augmenting Privacy for E-Wallet Applications using Ranked Keyword Search

G. Jaspher W. Kathrine
2019 Zenodo  
Multi-Authority Attribute-Based Encryption The Multi-Authority Attribute-Based Encryption (MA-ABE) [37] [38] is also a cryptographic technique consisting of many authorities to manage the attributes  ...  In Attribute-Based Encryption, data owner uses a set of attributes to encrypt the data, and only the authorized users who have the predicted, or certain attributes can decrypt the data.  ... 
doi:10.5281/zenodo.4550923 fatcat:o5ij5vqltrht7neomaluo2ftqu

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Wei Zhang, Yaping Lin, Sheng Xiao, Jie Wu, Siwang Zhou
2016 IEEE transactions on computers  
In this paper, we propose schemes to deal with Privacy preserving Ranked Multi-keyword Search in a Multi-owner model (PRMSM).  ...  To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel Additive Order and Privacy Preserving Function family.  ...  A preliminary version of this paper appeared in the Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'14) [27] .  ... 
doi:10.1109/tc.2015.2448099 fatcat:37wcnfb6yzb73agr3cbk2mujmu

A Survey On Cryptographic Cloud Storage With Key Aggregate Searchable Encryption

Pallavi Vijay Nichal, Prof. P. L. Ramteke
2016 Zenodo  
preserving data sharing system based on public cloud storage which requires a data owner to distribute a large number of keys to users to enable them to access his/her documents, we for the first time  ...  In cloud computing, data owners host their data on cloud servers and users can access the data from cloud servers.  ...  In [8] , attribute based encryption (ABE) is applied to achieve fine-grained access control aware keyword search.  ... 
doi:10.5281/zenodo.47039 fatcat:2o33ixs4kfbvjpxcwskm7fikrm

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health  ...  We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the  ...  By preserving keyword privacy, this approach [62] validates and resolves the issue regarding fuzzy keyword searches across encrypted data in the cloud.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  Recently, several studies were conducted to address these risks, and a series of solutions were proposed to enable data and privacy protection in untrusted cloud environments.  ...  N a number of universal attributes k number of top-k related search results η number of ranking levels l length of a keyword in characters τ maximum size of the similarity keyword set d edit  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm
« Previous Showing results 1 — 15 out of 3,281 results