Filters








723 Hits in 6.3 sec

Semantic, Efficient, and Secure Search over Encrypted Cloud Data [article]

Fateh Boucenna
2020 arXiv   pre-print
To perform searches over outsourced data, it is no longer possible to exploit traditional search engines given that these data are encrypted.  ...  This technology provides its users with storage space and computing power according to their needs in a flexible and personalized way.  ...  After that, we have exploited a second secure inverted index in order to efficiently and securely manage the users' access rights to the data.  ... 
arXiv:2002.10294v1 fatcat:nbumfcohyrbjxmwypu4aagbv4u

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Rubin Thottupurathu Jose, Sojan Lal Poulose
2021 Advances in Science, Technology and Engineering Systems  
The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies.  ...  The user's access rights to data were managed by using second secure inverted index.  ...  In addition, the security of the encrypted reverse index and the access rights of users are examined.  ... 
doi:10.25046/aj060244 fatcat:bgcqyxyshncwbgnguspaxhrmpe

Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee, Tae Choong Chung, Yeng-Tseng Wang
2016 PLoS ONE  
To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain.  ...  Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider.  ...  Instead of executing a search query over encrypted data, the search query is evaluated for the index (inverted index) associated with the outsourced data.  ... 
doi:10.1371/journal.pone.0161440 pmid:27571421 pmcid:PMC5003394 fatcat:7fsptnc4w5empd36qj6khcelzq

A Secure Search Engine for the Personal Cloud

Saliha Lallali, Nicolas Anciaux, Iulian Sandu Popa, Philippe Pucheral
2015 Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15  
However, leaving the data management control to user's hands pushes the security issues to the user's platform.  ...  The main difficulty lies in the design of an inverted document index and its related search and update algorithms capable of tackling the strong hardware constraints of these devices.  ...  The proposed solution combines a traditional home cloud data system organizing the document dataspace and a secure hardware-based co-server managing the encryption/decryption of documents and enforcing  ... 
doi:10.1145/2723372.2735376 dblp:conf/sigmod/LallaliAPP15 fatcat:aebkt7eignhjbdlr3is2jy75xe

A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage

S. Nandhini Devi, Mr. S. Rajarajan
2019 Zenodo  
, quality based information partaking, encrypted data sharing and mutual influence Based Privacy Preserving verification set of rules for right to use manage of outsourced information.  ...  Data contribution in the cloud is a procedure so as to allow users to expediently right of entry information in excess of the cloud.  ...  "Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-based Sign encryption" Qiang Tang et.al [5] (2014) suggested a searchable encryption namely multi-party searchable  ... 
doi:10.5281/zenodo.3589450 fatcat:lvvwajplavacxpp527nlxxcmr4

Survey on Secure Search Over Encrypted Data on the Cloud [article]

Hoang Pham, Jason Woodworth, Mohsen Amini Salehi
2018 arXiv   pre-print
User-side encryption techniques can be employed to mitigate the security concerns. Nonetheless, once the data in encrypted, no processing (e.g., searching) can be performed on the outsourced data.  ...  However, potentials of the cloud services have not been fully unleashed due to users' concerns about security and privacy of their data in the cloud.  ...  This Build-Index process is used by the data owner to generate a secure and searchable strucure that enables search over the encrypted data.  ... 
arXiv:1811.09767v1 fatcat:scgxzjjnvfbbbnh7wxpr6eu5ci

Ensuring Security and Privacy Preservation for Cloud Data Services

Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya
2016 ACM Computing Surveys  
We then dwell on existing protection solutions to achieve secure, dependable, and privacy-assured cloud data services including data search, data computation, data sharing, data storage, and data access  ...  We first present security threats and requirements of an outsourcing data service to a cloud, and follow that with a high-level overview of the corresponding security technologies.  ...  Users always expect that a cloud system is able to perform flexible search over encrypted data just like it does over plain data.  ... 
doi:10.1145/2906153 fatcat:c57iz6lswvfxbmhireksha35vm

Accessing Dynamic Health Records using KVertex Search Scheme Model towards Hierarchical Users mod Obscure Servers

2019 International journal of recent technology and engineering  
This proposed system accords the description of k vertex leading in the access control using encoded data over scrutinizing encryption model at the equivalent time stage.  ...  The data user retrieves hold, allow along with convinced strategical provisions. The previous works define the ensemble Signature paradigm that has been taken advantage of mulct signer formats.  ...  access using cryptographic schemes Attribute based encryption has been utilized to endow with security and access control on both inside and outside assail to the outsourced data as it became well-liked  ... 
doi:10.35940/ijrte.c5237.098319 fatcat:ppwpbwq3xzhedc6ejdfztcpgwa

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data [article]

Xueyan Liu, Zhitao Guan, Xiaojiang Du, Liehuang Zhu, Zhengtao Yu, Yinglong Ma
2018 arXiv   pre-print
In ESAS, by integrating PRSCG (the privacy-preserving ranked search based on con-ceptual graph) and CP-ABE (ciphertext policy attribute-based encryption), semantic search with file-level fine-grained access  ...  Nowadays, a large amount of user privacy-sensitive data is outsourced to the cloud server in ciphertext, which is provided by the data owners and can be accessed by authorized data users.  ...  Enterprise and individual users purchase cloud services from cloud service providers and utilize cloud services for data management and storage.  ... 
arXiv:1811.06917v1 fatcat:ruscqxjdr5c7dkfm4y7l26z5aa

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li
2016 IEEE Transactions on Parallel and Distributed Systems  
Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-beforeoutsourcing is a fundamental solution to protecting user data privacy in the untrusted  ...  Inspired by attribute-based encryption (ABE), we present the first attribute-based keyword search scheme with efficient user revocation (ABKS-UR) that enables scalable fine-grained (i.e. file-level) search  ...  To enforce fine-grained authorized keyword search, the data owner generates the secure indexes with attribute-based access policies before outsourcing them along with the encrypted data into the CS.  ... 
doi:10.1109/tpds.2014.2355202 fatcat:24mng52ru5fzrdjstpyiysthfe

A COMBINED DATA STORAGE WITH ENCRYPTION AND KEYWORD BASED DATA RETRIEVAL USING SCDS-TM MODEL IN CLOUD

S.V. Divya, R.S. Shaji, P. Venkadesh
2019 Malaysian Journal of Computer Science  
This technology facilitates the enterprises to move their confidential data into the cloud, where their data is stored in a remote data centers and accessed via the internet.  ...  In order to augment the data retrieval functionality, we exploited a keyword search method called "coordinate matching" technique of capturing the related documents based upon the search query.The performance  ...  So a privacy-preserving data search service over encrypted cloud data [16] [17] was proposed and it remains a challenging problem for sharing cloud data and performs searching over those encrypted data  ... 
doi:10.22452/mjcs.vol32no3.1 fatcat:742c3elsajec5a4dcxyxulq22m

Mimir: Term-distributed indexing and search for secret documents

Guoqiang Gao, Ruixuan Li, Xiwu Gu, Kunmei Wen, Zhengding Lu, Kun Yan
2010 Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing  
Mimir utilizes encryption with random key, partial key update, and access control based on role and user to protect sensitive data and improve query efficiency.  ...  Our experiments show that Mimir can effectively protect secret data and answer queries nearly as fast as an ordinary inverted index.  ...  Li et al. [15] distribute index contains fuzzy keywords and encrypted files into the cloud servers. This strategy can provide an effective fuzzy keyword search over encrypted cloud data.  ... 
doi:10.4108/icst.collaboratecom.2010.25 dblp:conf/colcom/GaoLGWLY10 fatcat:ed64l7uesrcsni3rmmc63kqfra

Lattice-based Key-Aggregate (Searchable) Encryption in Cloud Storage

Yanqing Yao, Zhengde Zhai, Jianwei Liu, Zhoujun Li
2019 IEEE Access  
INDEX TERMS Cloud storage, searchable data sharing, key-aggregate encryption, key-aggregate searchable encryption, lattice-based problem, the learning with errors problem.  ...  Traditionally, a large quantity of encryption keys have to be managed by the data owner, and an equally large number of keyword trapdoors must be sent to the cloud for the purpose of searching over the  ...  is sent to the cloud by the authorized user to perform keyword search over the encrypted data.  ... 
doi:10.1109/access.2019.2952163 fatcat:xp6dffo3yjh7hojx57dkh2i4ly

Research on the Ranked Searchable Encryption Scheme Based on an Access Tree in IoTs

Yan-Yan Yang, Bei Gong, Zhi-Juan Jia, Ya-Ge Cheng, Yu-Chu He, Zhihan Lv
2021 Wireless Communications and Mobile Computing  
Thirdly, the solution uses an access tree control structure to control user authority and realizes fine-grained access management to data by data owners in the IoTs.  ...  Aiming at the hugeness, redundancy, and heterogeneity of data in the IoTs, this paper proposes a ranked searchable encryption scheme based on an access tree.  ...  Only users whose attributes meet the access policy defined by the data owner can search encrypted data with multiple keywords, so as to realize the fine-grained access management of the data by the data  ... 
doi:10.1155/2021/3265934 fatcat:5hxtk4xuwngqrbfhjvvb72bi6q

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li
2014 IEEE INFOCOM 2014 - IEEE Conference on Computer Communications  
Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-beforeoutsourcing is a fundamental solution to protecting user data privacy in the untrusted  ...  Many secure search schemes have been focusing on the single-contributor scenario, where the outsourced dataset or the secure searchable index of the dataset are encrypted and managed by a single owner,  ...  over encrypted cloud data  ... 
doi:10.1109/infocom.2014.6847943 dblp:conf/infocom/SunYLHL14 fatcat:k2zb4224hnfuvnlgucq4hzj4ci
« Previous Showing results 1 — 15 out of 723 results