Filters








3,244 Hits in 3.5 sec

On securing untrusted clouds with cryptography

Yao Chen, Radu Sion
2010 Proceedings of the 9th annual ACM workshop on Privacy in the electronic society - WPES '10  
In a recent interview, Whitfield Diffie argued that "the whole point of cloud computing is economy" and while it is possible in principle for "computation to be done on encrypted data, [...] current techniques  ...  Here we explore whether this is truly the case and quantify just how expensive it is to secure computing in untrusted, potentially curious clouds.  ...  To address this, existing secure outsourcing research addressed several issues ranging from guaranteeing integrity, confidentiality and privacy of outsourced data to secure querying on outsourced encrypted  ... 
doi:10.1145/1866919.1866935 dblp:conf/wpes/ChenS10 fatcat:yvysp3j2qzhirpczw5xaayyvey

Enforcing Privacy in Cloud Databases [article]

Somayeh Sobati Moghadam, Gérald Gavin
2017 arXiv   pre-print
aim at making databases secure in a cloud environment, and discuss current pitfalls and related research challenges.  ...  However, most data are sensitive to some extent, and data privacy remains one of the top concerns to DBaaS users, for obvious legal and competitive reasons.In this paper, we survey the mechanisms that  ...  This feature allows range queries, MIN and MAX aggregations, and ordering over ciphertexts. In terms of security, OPE is weaker than DET because it reveals data order.  ... 
arXiv:1708.09171v1 fatcat:stvwiwy3b5bo5gdxmxcv3w46pm

Dynamic spatial index for efficient query processing on the cloud

Ibrahim Kamel, Ayesha M. Talha, Zaher Al Aghbari
2017 Journal of Cloud Computing: Advances, Systems and Applications  
This paper proposes DISC (Dynamic Index for Spatial data on the Cloud), a secure retrieval scheme to answer range queries over encrypted databases at the Cloud Service Provider.  ...  With transformation and cryptography techniques, DISC achieves a balance between efficient query execution and data confidentiality in a cloud environment.  ...  To allow range queries over encrypted numeric data, Agrawal et al.  ... 
doi:10.1186/s13677-017-0077-0 fatcat:u3lx6f3pojaf5nrx4zvimwdl6y

Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services

Hui Zhu, Fen Liu, Hui Li
2017 IEEE Internet of Things Journal  
With SPSQ, Polaris can search outsourced encrypted LBS data in cloud server by the encrypted request, and respond the encrypted polygons spatial query results accurately.  ...  With Polaris, the LBS provider outsources the encrypted LBS data to cloud server, and the registered user can query any polygon range to get accurate LBS results without divulging his/her query information  ...  Homomorphic encryption is a usual method to achieve data operations over encrypted data without decrypting it, which can be used for outsourced environment. Ghinita et al.  ... 
doi:10.1109/jiot.2016.2553083 fatcat:jir5bhsq2ng4ln3prpsijdntma

Twin Clouds: Secure Cloud Computing with Low Latency [chapter]

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
2011 Lecture Notes in Computer Science  
However, existing approaches for provably secure outsourcing of data and arbitrary computations are either based on tamper-proof hardware or fully homomorphic encryption.  ...  We propose an architecture and protocols that accumulate slow secure computations over time and provide the possibility to query them in parallel on demand by leveraging the benefits of cloud computing  ...  This work was in part funded in part by the European Commission through the ICT program under contract 257243 TClouds and 216676 ECRYPT II.  ... 
doi:10.1007/978-3-642-24712-5_3 fatcat:hlhej2sgk5gajd3l2m4mfwlnby

SPATIAL LOCATION OF ASSURANCE WITH WITNESS OF MUTUAL PROOFS PROVIDING PRIVACY FOR MOBILE USERS

Gadipalli Bhavani
2019 International Journal of Advanced Research  
In addition, extensive experiments are conducted, and the results demonstrate that spatial range is very efficient in privacy preserving spatial range query over outsourced encrypted data.  ...  Location-based services (LBS), outsourced encrypted data, privacyenhancing technology, spatial range query.  ...  In addition, extensive experiments are conducted, and the results demonstrate that spatial range is very efficient in privacy preserving spatial range query over outsourced encrypted data.  ... 
doi:10.21474/ijar01/8578 fatcat:wwg67qzw2bhdloccfqvqfwwkd4

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

Gladiss Merlin. N
2017 International Journal of Scientific Research and Management  
Even though searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data  ...  An effective method proposed for this challenging problem is privacy-preserving search over encrypted cloud data.  ...  The major issue is of security in service outsourcing: the elements of an encryption scheme and the execution protocol for encrypted query processing.  ... 
doi:10.18535/ijsrm/v5i12.06 fatcat:zqne5kvarzdw7pgeizjwbztmpm

Balancing Query Performance and Security on Relational Cloud Database: An Architecture

A. A.Obiniyi, Rosemary M. Dzer, S.E. Abdullahi
2015 International Journal of Computer Applications  
This challenge can be addressed by encrypting data before outsourcing in other to insure its privacy from internal and external intruders.  ...  Encryption implies a sacrifice of functionality for security. Querying encrypted data is performed by decrypting the entire data before retrieval. This leads to performance degradation.  ...  Aiming at striking a balance between security and efficient query processing on encrypted databases, [12] implemented a technique that allows users to query directly over the encrypted column without  ... 
doi:10.5120/20825-3473 fatcat:p7co6xqlnrfejo2yvecvm2ytga

Secure and Effectual Cloud Data Deduplication Verification

Lingeshwaran. B, Tamilselvan. V, Vigneshwaran. V
2018 International Journal of Trend in Scientific Research and Development  
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner.  ...  However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment.  ...  The secure search is a technique that allows an authorized data user to search over the data owner's encrypted data by submitting encrypted query keywords in a privacy-preserving manner and is an effective  ... 
doi:10.31142/ijtsrd11501 fatcat:5zzluojwyrerpo2lrfd2ff42p4

Adaptive, secure, and scalable distributed data outsourcing

Li Xiong, Slawomir Goryczka, Vaidy Sunderam
2011 Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems - 3DAPAS '11  
In this paper, we present our vision of an adaptive, secure, and scalable data outsourcing framework for storing and processing massive, dynamic, and potentially sensitive data using distributed resources  ...  We believe the framework will provide a holistic conceptual foundation for secure data outsourcing that enables dynamic, distributed, and data-intensive applications and will open up many exciting research  ...  Several recent works studied the data outsourcing problem in the context of highly distributed environments.  ... 
doi:10.1145/1996010.1996012 fatcat:57eoibmewzcypidrbahfxlyxqa

Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation

Lakshmi A, Mandara Nagendra, Shreeraksha L, Chandru A S
2017 IJARCCE  
In this paper, we propose a safe tourist application for privacy preserving spatial range query.  ...  To achieve privacy preserving spatial range query, we propose the first predicate only encryption scheme for inner product range, which can be used to detect whether a position is within a given circular  ...  COMPARATIVE STUDY Our work is related to not only privacy-preserving LBS but also privacy-preserving query over outsourced encrypted data.  ... 
doi:10.17148/ijarcce.2017.6596 fatcat:qbtkcf73qjc3vmjuvgxadxx6um

An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases

Sultan Almakdi, Brajendra Panda, Mohammed S. Alshehri, Abdulwahab Alazeb
2021 IEEE Access  
HOM can secure numeric data in cloud environments; however, encrypting with HOM produces long ciphertexts, since this type of encryption is based on an asymmetric encryption system.  ...  While this encryption technique provides the highest security level for outsourced databases, it has a major drawback in cloud databases,namely the inability to execute SQL queries over ciphertexts.  ...  In this experiment, we executed update statements with only one predicate. As seen in Figure. 11, the update time cost is high in all systems and is the result of updating an encrypted field  ... 
doi:10.1109/access.2021.3082139 fatcat:jwsswenykjfq7g4isphoraxafu

PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension

Feng Chen, Chenghong Wang, Wenrui Dai, Xiaoqian Jiang, Noman Mohammed, Md Momin Al Aziz, Md Nazmus Sadat, Cenk Sahinalp, Kristin Lauter, Shuang Wang
2017 BMC Medical Genomics  
Conclusions: The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and  ...  perfect hash scheme to enable efficient and secure data storage and computation outsourcing.  ...  Homomorphic encryption (HME) is one of the most popular technologies for secure computation over the encrypted data.  ... 
doi:10.1186/s12920-017-0281-2 pmid:28786365 pmcid:PMC5547453 fatcat:qvfk5n5oijhjvn53m3ibhzcegu

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments

Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
2011 2011 Sixth International Conference on Availability, Reliability and Security  
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems.  ...  In this paper, we want to address the issue of enforcing security policies in an untrusted environment while protecting the policy confidentiality.  ...  , etc.) over the data residing on the outsourced environment.  ... 
doi:10.1109/ares.2011.23 dblp:conf/IEEEares/AsgharIRC11 fatcat:d3fe3n7vqbappcafdb2u4r2r7i

Information Security And Secure Search Over Encrypted Data In Cloud Storage Services

Mr. A Mustagees Shaikh *, Prof. Nitin B. Raut
2016 Zenodo  
In this project we use searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and user's queries.  ...  This technique helps us to save securely our sensitive data in cloud storage and retrieve this data while we required without leaking our private data through Information Security and Secure Search over  ...  In this paper, we solve the problem of secure ranked keyword search over encrypted cloud data.  ... 
doi:10.5281/zenodo.49753 fatcat:tz5prn4oibee7avs3rn4k4iuru
« Previous Showing results 1 — 15 out of 3,244 results