A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
On securing untrusted clouds with cryptography
2010
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society - WPES '10
In a recent interview, Whitfield Diffie argued that "the whole point of cloud computing is economy" and while it is possible in principle for "computation to be done on encrypted data, [...] current techniques ...
Here we explore whether this is truly the case and quantify just how expensive it is to secure computing in untrusted, potentially curious clouds. ...
To address this, existing secure outsourcing research addressed several issues ranging from guaranteeing integrity, confidentiality and privacy of outsourced data to secure querying on outsourced encrypted ...
doi:10.1145/1866919.1866935
dblp:conf/wpes/ChenS10
fatcat:yvysp3j2qzhirpczw5xaayyvey
Enforcing Privacy in Cloud Databases
[article]
2017
arXiv
pre-print
aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges. ...
However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that ...
This feature allows range queries, MIN and MAX aggregations, and ordering over ciphertexts. In terms of security, OPE is weaker than DET because it reveals data order. ...
arXiv:1708.09171v1
fatcat:stvwiwy3b5bo5gdxmxcv3w46pm
Dynamic spatial index for efficient query processing on the cloud
2017
Journal of Cloud Computing: Advances, Systems and Applications
This paper proposes DISC (Dynamic Index for Spatial data on the Cloud), a secure retrieval scheme to answer range queries over encrypted databases at the Cloud Service Provider. ...
With transformation and cryptography techniques, DISC achieves a balance between efficient query execution and data confidentiality in a cloud environment. ...
To allow range queries over encrypted numeric data, Agrawal et al. ...
doi:10.1186/s13677-017-0077-0
fatcat:u3lx6f3pojaf5nrx4zvimwdl6y
Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services
2017
IEEE Internet of Things Journal
With SPSQ, Polaris can search outsourced encrypted LBS data in cloud server by the encrypted request, and respond the encrypted polygons spatial query results accurately. ...
With Polaris, the LBS provider outsources the encrypted LBS data to cloud server, and the registered user can query any polygon range to get accurate LBS results without divulging his/her query information ...
Homomorphic encryption is a usual method to achieve data operations over encrypted data without decrypting it, which can be used for outsourced environment. Ghinita et al. ...
doi:10.1109/jiot.2016.2553083
fatcat:jir5bhsq2ng4ln3prpsijdntma
Twin Clouds: Secure Cloud Computing with Low Latency
[chapter]
2011
Lecture Notes in Computer Science
However, existing approaches for provably secure outsourcing of data and arbitrary computations are either based on tamper-proof hardware or fully homomorphic encryption. ...
We propose an architecture and protocols that accumulate slow secure computations over time and provide the possibility to query them in parallel on demand by leveraging the benefits of cloud computing ...
This work was in part funded in part by the European Commission through the ICT program under contract 257243 TClouds and 216676 ECRYPT II. ...
doi:10.1007/978-3-642-24712-5_3
fatcat:hlhej2sgk5gajd3l2m4mfwlnby
SPATIAL LOCATION OF ASSURANCE WITH WITNESS OF MUTUAL PROOFS PROVIDING PRIVACY FOR MOBILE USERS
2019
International Journal of Advanced Research
In addition, extensive experiments are conducted, and the results demonstrate that spatial range is very efficient in privacy preserving spatial range query over outsourced encrypted data. ...
Location-based services (LBS), outsourced encrypted data, privacyenhancing technology, spatial range query. ...
In addition, extensive experiments are conducted, and the results demonstrate that spatial range is very efficient in privacy preserving spatial range query over outsourced encrypted data. ...
doi:10.21474/ijar01/8578
fatcat:wwg67qzw2bhdloccfqvqfwwkd4
Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment
2017
International Journal of Scientific Research and Management
Even though searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data ...
An effective method proposed for this challenging problem is privacy-preserving search over encrypted cloud data. ...
The major issue is of security in service outsourcing: the elements of an encryption scheme and the execution protocol for encrypted query processing. ...
doi:10.18535/ijsrm/v5i12.06
fatcat:zqne5kvarzdw7pgeizjwbztmpm
Balancing Query Performance and Security on Relational Cloud Database: An Architecture
2015
International Journal of Computer Applications
This challenge can be addressed by encrypting data before outsourcing in other to insure its privacy from internal and external intruders. ...
Encryption implies a sacrifice of functionality for security. Querying encrypted data is performed by decrypting the entire data before retrieval. This leads to performance degradation. ...
Aiming at striking a balance between security and efficient query processing on encrypted databases, [12] implemented a technique that allows users to query directly over the encrypted column without ...
doi:10.5120/20825-3473
fatcat:p7co6xqlnrfejo2yvecvm2ytga
Secure and Effectual Cloud Data Deduplication Verification
2018
International Journal of Trend in Scientific Research and Development
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. ...
However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. ...
The secure search is a technique that allows an authorized data user to search over the data owner's encrypted data by submitting encrypted query keywords in a privacy-preserving manner and is an effective ...
doi:10.31142/ijtsrd11501
fatcat:5zzluojwyrerpo2lrfd2ff42p4
Adaptive, secure, and scalable distributed data outsourcing
2011
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems - 3DAPAS '11
In this paper, we present our vision of an adaptive, secure, and scalable data outsourcing framework for storing and processing massive, dynamic, and potentially sensitive data using distributed resources ...
We believe the framework will provide a holistic conceptual foundation for secure data outsourcing that enables dynamic, distributed, and data-intensive applications and will open up many exciting research ...
Several recent works studied the data outsourcing problem in the context of highly distributed environments. ...
doi:10.1145/1996010.1996012
fatcat:57eoibmewzcypidrbahfxlyxqa
Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation
2017
IJARCCE
In this paper, we propose a safe tourist application for privacy preserving spatial range query. ...
To achieve privacy preserving spatial range query, we propose the first predicate only encryption scheme for inner product range, which can be used to detect whether a position is within a given circular ...
COMPARATIVE STUDY Our work is related to not only privacy-preserving LBS but also privacy-preserving query over outsourced encrypted data. ...
doi:10.17148/ijarcce.2017.6596
fatcat:qbtkcf73qjc3vmjuvgxadxx6um
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases
2021
IEEE Access
HOM can secure numeric data in cloud environments; however, encrypting with HOM produces long ciphertexts, since this type of encryption is based on an asymmetric encryption system. ...
While this encryption technique provides the highest security level for outsourced databases, it has a major drawback in cloud databases,namely the inability to execute SQL queries over ciphertexts. ...
In this experiment, we executed update statements with only one predicate. As seen in Figure. 11, the update time cost is high in all systems and is the result of updating an encrypted field ...
doi:10.1109/access.2021.3082139
fatcat:jwsswenykjfq7g4isphoraxafu
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
2017
BMC Medical Genomics
Conclusions: The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and ...
perfect hash scheme to enable efficient and secure data storage and computation outsourcing. ...
Homomorphic encryption (HME) is one of the most popular technologies for secure computation over the encrypted data. ...
doi:10.1186/s12920-017-0281-2
pmid:28786365
pmcid:PMC5547453
fatcat:qvfk5n5oijhjvn53m3ibhzcegu
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments
2011
2011 Sixth International Conference on Availability, Reliability and Security
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. ...
In this paper, we want to address the issue of enforcing security policies in an untrusted environment while protecting the policy confidentiality. ...
, etc.) over the data residing on the outsourced environment. ...
doi:10.1109/ares.2011.23
dblp:conf/IEEEares/AsgharIRC11
fatcat:d3fe3n7vqbappcafdb2u4r2r7i
Information Security And Secure Search Over Encrypted Data In Cloud Storage Services
2016
Zenodo
In this project we use searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and user's queries. ...
This technique helps us to save securely our sensitive data in cloud storage and retrieve this data while we required without leaking our private data through Information Security and Secure Search over ...
In this paper, we solve the problem of secure ranked keyword search over encrypted cloud data. ...
doi:10.5281/zenodo.49753
fatcat:tz5prn4oibee7avs3rn4k4iuru
« Previous
Showing results 1 — 15 out of 3,244 results