898 Hits in 2.9 sec

Toward privacy-assured and searchable cloud data storage services

Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. T. Hou
2013 IEEE Network  
Thus, to support privacy-assured graph search over encrypted data, they convert both the data and query graphs into binary feature vectors (data structure), and use their dot product as the filtering condition  ...  Over the past decade, searchable encryption (SE) techniques have become a significant research area [6, 11] , which are tailored cryptographic solutions addressing privacyassured search over encrypted  ... 
doi:10.1109/mnet.2013.6574666 fatcat:mq2f4esfizemrkopan34m247ua

A Secured and Searchable Encryption Algorithm for Cloud Storage

Krati Mehto, Rahul Moriwal
2015 International Journal of Computer Applications  
Therefore in this paper a proposed solution incorporate the hash table management and indexing techniques to keep track the actual data contents in terms of document features which may help for encrypting  ...  user data and identifying the user data and privacy.  ...  Their searchable encryption scheme provides rich expressiveness of index terms by exploiting ABE, thus providing data security. 2.  ... 
doi:10.5120/21223-3946 fatcat:ozwxlfp5ebdyzb5syxplmb32ua

A Survey On Key-Aggregate Searchable Encryption For Group Data Sharing In Cloud Storage

Swapnil D. Raut*, Prof. Avinash P. Wadhe, Prof. Jayant P. Mehare
2016 Zenodo  
Security concerns over inadvertent data leaks in the cloud may greatly ease the capability of selectively sharing encrypted data with different users via public cloud storage.  ...  number of keywords trapdoors to the cloud in order to perform search over the shared data.  ...  Multi user searchable Encryption A rich literature has been available on searchable encryption. Including SSE schemes [5] - [8] and PEKS schemes [9] - [15] .  ... 
doi:10.5281/zenodo.48345 fatcat:o6uqba5vczgx3pz5zt2axbptse

Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption

Redwan Walid, Karuna P. Joshi, Seung Geol Choi, Dae-young Kim
2020 2020 IEEE International Conference on Big Data (Big Data)  
As the volume of cloud-based EHRs reaches Big Data levels, it is essential to search over these encrypted patient records without decrypting them to ensure that the medical caregivers can efficiently access  ...  In this paper, we present our novel approach that facilitates searchable encryption of large EHR systems using Attribute-based Encryption (ABE) and multi-keyword search techniques.  ...  solutions for encrypted data, including searchability [29] .  ... 
doi:10.1109/bigdata50022.2020.9378002 fatcat:rdhtvkjhcrbjhhgawq2b7lqfae

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities

Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
In particular, we focus on two representative types of flexible search functionalities: ranked keyword search, and search over structured data.  ...  A full-fledged cloud data service should effectively support data utilization tasks, especially flexible data search functionalities, while simultaneously achieve user privacy assurance and meet practical  ...  On the other hand, "searchable encryption" (SE) techniques have been proposed, which are specific solutions addressing the needs for private search over encrypted data.  ... 
doi:10.1109/icdcsw.2012.41 dblp:conf/icdcsw/LiYLH12 fatcat:etuikjcsv5dgbgoiya7rkms5je

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications [chapter]

Wei Song, Yihui Cui, Zhiyong Peng
2015 Lecture Notes in Computer Science  
Several related works have been proposed to enable the search over the encrypted data, but all of them only support the encrypted keyword search.  ...  In this paper, we propose a new full-text retrieval algorithm over the encrypted data for the scenario of cloud storage, in which all the words in a document have been extracted and built a privacy-preserved  ...  The existing researches that are similar to ours can be found in the areas of keyword searchable encryption, rich functional encrypted data search, and ranked search over encrypted data.  ... 
doi:10.1007/978-3-319-25207-0_20 fatcat:kzb3wzkdzvdvdauq2pvqxl5664

A Novel Approach for Sharing Encrypted Data Over Cloud

Prof B.S. Vamsi Krishna, Bingi Anu Reshma
2017 IJARCCE  
Data sharing is an important functionality in cloud storage for searchable encryption.  ...  In this paper, we describe how to securely, efficiently and flexibly share data over multi users in cloud storage. We developed a secret key for multi users which are group key and normal single key.  ...  Sakurai are proposed a paper "multi-user keyword search scheme for secure data sharing with fine-grained access control" .There is a rich literature on searchable encryption, including SSE(searchable symmetric  ... 
doi:10.17148/ijarcce.2017.65146 fatcat:gdccszzafzcj7nxofzjy72u4l4

Building an Encrypted, Distributed, and Searchable Key-value Store

Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
To enable secure search queries for secondary attributes of data, we leverage searchable symmetric encryption to design the encrypted secondary indexes which consider security, efficiency, and data locality  ...  In this paper, we focus on designing and implementing an encrypted, distributed, and searchable key-value store.  ...  over encrypted data.  ... 
doi:10.1145/2897845.2897852 dblp:conf/ccs/YuanWWQL16 fatcat:67ox2tjq4vbhfkanccgf6x7324

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data [chapter]

Fahad Shaon, Murat Kantarcioglu
2016 Lecture Notes in Computer Science  
To address this challenge, efficient searchable encryption schemes have been developed over the years.  ...  To this end, we provide an extensible framework for supporting complex search queries over encrypted multimedia data.  ...  Background and Threat Model Searchable Symmetric Encryption (SSE) is one of the many mechanisms to enable search over encrypted data.  ... 
doi:10.1007/978-3-319-41483-6_14 fatcat:xsjisxeguvh5lk7hhhttws2mfa

Usable, Secure, Private Search

Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin, Salvatore J. Stolfo
2012 IEEE Security and Privacy  
Using a new primitive,re-routable encryption, and the ideas of Bloom filters [1] and deterministic encryption [7], SADS allows multiple parties to efficiently execute exact match queries over distributed  ...  encrypted database in a controlled manner.  ...  [17] Vaultive and Navajo Systems (recently acquired by SalesForce) provide access to encrypted data through a proxy, optionally allowing searchability via deterministic encryption of individual tokens  ... 
doi:10.1109/msp.2011.155 fatcat:ot5ecq4befel7onjpbodmekj3u

Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud

Yunhong Zhou, Shihui Zheng, Licheng Wang
2020 Cryptography  
In the area of searchable encryption, public key encryption with keyword search (PEKS) has been a critically important and promising technique which provides secure search over encrypted data in cloud  ...  fine-grained access control and keyword search over encrypted data simultaneously.  ...  To better solve the keyword search problem over encrypted data, searchable encryption (SE) was proposed as an efficient solution.  ... 
doi:10.3390/cryptography4040028 fatcat:w23uk76mnbhqho3hcmtpamzxia

Breaking Web Applications Built On Top of Encrypted Data

Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We then apply it to Mylar, a framework that uses multi-key searchable encryption (MKSE) to build Web applications on top of encrypted data.  ...  We conclude with general lessons for the designers of systems that rely on property-preserving or searchable encryption to protect data from untrusted servers.  ...  Features not protected by encryption Even secure encryption leaks many features of the data, such relative sizes.  ... 
doi:10.1145/2976749.2978351 dblp:conf/ccs/GrubbsMNRS16 fatcat:f2uiff3l4rfotfqkuii4peonny

Security and privacy in big data

Yang Xiang, Man Ho Au, Miroslaw Kutylowsky
2016 Concurrency and Computation  
To effectively solve data security problem and promote the development of cloud computing, the Gartner thinks that encryption scheme  ...  Facing such huge amount of data files, hospitals have to resort to third-party data storage and management centers to maintain the massive data sets.  ...  query over encrypted cloud data [6] .  ... 
doi:10.1002/cpe.3796 fatcat:n4kx5y34f5hzhn3us52ug7dwci

Implementing Data Privacy of Cloud Data on a Remote Server using Symmetric Cryptographic Algorithms

David Livingston, Ezra Kirubakaran, Eben Priya David
2021 International Journal of Advances in Data and Information Systems  
Among various encryption symmetric algorithms, Advanced Encryption Standard is the more secured symmetric encryption algorithm for implementing data privacy on the cloud.  ...  Different mechanisms are available for securing the data on the cloud among which encryption of data using cryptographic algorithm is the widely used one.  ...  They identified the need for Searchable Encryption (SE) technique, which ensures privacy-assured search over encrypted data.  ... 
doi:10.25008/ijadis.v2i1.1217 fatcat:lc6645jlsnf6bb76xofym6o3um

2018 Index IEEE Transactions on Dependable and Secure Computing Vol. 15

2019 IEEE Transactions on Dependable and Secure Computing  
Bogdanov, D., þ, TDSC May -June 2018 481-495 Searchable Encryption over Feature-Rich Data.  ...  -Dec. 2018 959-973 Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data. Wang, B., þ, TDSC Nov. -Dec. 2018 1027-1040 Searchable Encryption over Feature-Rich Data.  ... 
doi:10.1109/tdsc.2018.2885264 fatcat:wiyn5wmxnvd2lhezuopwqkan3a
« Previous Showing results 1 — 15 out of 898 results