A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Storage Efficient Substring Searchable Symmetric Encryption
2018
Proceedings of the 6th International Workshop on Security in Cloud Computing - SCC '18
We revisit the work of substring searchable encryption in order to reduce the storage cost of auxiliary data structures. ...
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. ...
In this paper we design and analyze a storage efficient Substring Searchable Symmetric Encryption (S 3 E) protocol with variable size of substrings. ...
doi:10.1145/3201595.3201598
dblp:conf/ccs/LeontiadisL18
fatcat:h666zdxouzabtovpf3o37mfdia
Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup
2016
Future Internet
In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. ...
Our solution efficiently finds occurrences of a given substring over encrypted cloud data. ...
We formally define a Multi-User Substring Position Searchable Symmetric Encryption (MSSP-SSE) and present an efficient construction. ...
doi:10.3390/fi8030028
fatcat:5c4lrleskvfkvcwk3eqc2rvnru
Substring-Searchable Symmetric Encryption
2015
Proceedings on Privacy Enhancing Technologies
First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) and structured encryption. ...
Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencrypted suffix trees. ...
Substring-searchable symmetric encryption We define substring-searchable encryption as a special case of queryable encryption.
Definition 4.2. ...
doi:10.1515/popets-2015-0014
dblp:journals/popets/ChaseS15
fatcat:ok24piheijfhpc524okcy7qn2y
Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing
IJARCCE - Computer and Communication Engineering
2015
IJARCCE
IJARCCE - Computer and Communication Engineering
Searchable Symmetric Encryption (SSE) use to secure and retrieve data from the cloud and it also focus on addressing data privacy issues. ...
To remove the leakage of data, we propose Two Round Searchable Encryption (TRSE) scheme that supports top-k multi-keyword retrieval. In TRSE, we use Vector Space Model & Homomorphic Encryption. ...
TRSE DESIGN Existing Searchable Symmetric Encryption (SSE) scheme works server-side ranking based on Order Preserving Encryption (OPE) to improve the efficiency of retrieval of encrypted cloud data. ...
doi:10.17148/ijarcce.2015.4338
fatcat:3yvwu7kjmvhslfjyazho4lof6q
Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud
2021
Security and Communication Networks
Searchable symmetric encryption (SSE) is a popular solution that can support efficient attribute queries over encrypted datasets in the cloud. ...
This paper aims to address this issue by proposing an efficient and privacy-preserving SSE scheme supporting compound substring queries. ...
For balancing the leakage and efficiency, many studies focus on searchable symmetric encryption (SSE). Song et al. ...
doi:10.1155/2021/7941233
fatcat:4zun3r32wrg4hfveqw6avfm2si
Embedding edit distance to enable private keyword search
2012
Human-Centric Computing and Information Sciences
Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods: We adapt results on private identification schemes by Bringer et al. to this new context. ...
Symmetric Searchable Encryption (SSE) as introduced by [2] relies on symmetric encryption primitives for efficiency reasons. ...
The main goal of searchable encryption [2, 25] is to store messages into an encrypted database while still enabling to search the messages related to some keywords. ...
doi:10.1186/preaccept-1253053215890607
fatcat:4row4c54wrfdvanjd7sadxmswq
Substring-searchable attribute-based encryption and its application for IoT devices
2020
Digital Communications and Networks
In this paper, a new kind of Attribute-Based Encryption (ABE) scheme, which is called the Sub-String Searchable ABE (SSS-ABE) scheme, is proposed for the sharing and querying of the encrypted data. ...
The data user can make a substring query on the whole ciphertext without setting keywords in advance. ...
To solve this problem, Chase and Shen [25] studied the substring searchable symmetric encryption and proposed the concept of queryable encryption, which can query substrings on the ciphertext. ...
doi:10.1016/j.dcan.2020.07.008
fatcat:53z5aeqx7rdapnhgajsmoz2zzu
Privacy-Preserving Substring Search on Multi-source Encrypted Gene Data
2020
IEEE Access
Most existing solutions for the privacy-preserving substring search problem are based on searchable encryption. ...
The analyses show that our scheme is secure and efficient for substring search on multi-source encrypted gene data. ...
Chase and Shen [6] utilized the suffix tree and the deterministic symmetric single-user SE to perform an efficiency substring search. However, the search pattern is leaked. ...
doi:10.1109/access.2020.2980375
fatcat:f3ycj34nijhtxinaho367fdoai
A study on searchable encryption schemes
2018
International Journal of Engineering & Technology
To overcome this contradiction, searchable encryption notion was introduced. ...
To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. ...
The two main dimensions of SE are Symmetric or private key Searchable encryption (SSE) and asymmetric or public key Searchable encryption with keyword search (PEKS). ...
doi:10.14419/ijet.v7i2.10995
fatcat:jkbeqssiyvfcbcksttcsjb5hce
USING DIFFERENT SEARCHING SCHEMAS FOR FUZZY KEYWORD SEARCH OVER CLOUD DATA
2013
Graduate Research in Engineering and Technology
So there comes the importance of encrypted cloud data search Traditional keyword search was based on plaintext keyword search, but for protecting data privacy the sensitive data should be encrypted before ...
Three different Fuzzy Search Schemas, The wild card method, gram based method and tree traverse search scheme, are dicussed and also the efficiency of these algorithms is analyzed. ...
Fig. 1.Searchable Symmetric Encryption Fuzzy keyword search will return the results by keeping the following two rules. 1. ...
doi:10.47893/gret.2013.1027
fatcat:6ckhq5wonzdxhgfexdw2mnefia
FPGA-accelerated Searchable Encrypted Database Management Systems for Cloud Services
2020
IEEE Transactions on Cloud Computing
Because searchable encryption allows query execution over encrypted data in the cloud, sensitive data can be securely stored there in the cloud. ...
DBMSs that use searchable encryption have been investigated with regard to ensuring their security. ...
We use Symmetric Searchable Encryption (SSE), proposed by Yoshino et al [29] . ...
doi:10.1109/tcc.2020.2969655
fatcat:bt3n6g475vczxijjkzoayy2pum
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage
2017
Algorithms
To resolve this problem, we propose a multi-server searchable symmetric encryption (SSE) scheme and construct a system called the searchable data vault (SDV). ...
A simple solution is for the user to encrypt all documents before submitting them. This method, however, makes it impossible to efficiently search for documents as they are all encrypted. ...
The controller is designed in such a way that the underlying searchable symmetric encryption (SSE) scheme, utilized for efficient search, is "pluggable". ...
doi:10.3390/a10020052
fatcat:r6bciv5aizfvjahbhmcfl3ceve
Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud
2015
2015 IEEE Trustcom/BigDataSE/ISPA
Searchable Symmetric Encryption (SSE) is an advanced cryptographic primitive addressing the above issue, which maintains efficient keyword search over encrypted data without disclosing much information ...
Subsequent privacy risks force data owners to encrypt sensitive data, hence making the outsourced data no longer searchable. ...
To address this issue, an advanced cryptographic primitive has been proposed, commonly known as Searchable Symmetric Encryption (SSE). ...
doi:10.1109/trustcom.2015.406
dblp:conf/trustcom/LiuZC15
fatcat:x6cwokg42fesbiuiulmez37ct4
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
[article]
2019
IACR Cryptology ePrint Archive
with the encrypted data on the storage provider. ...
Searchable encryption (SE) is a class of cryptographic techniques that addresses these issues. ...
ACKNOWLEDGEMENTS The authors would primarily like to thank Scott Arciszewski and his project CipherSweet for the implementation of the blind indexing approach to searchable encryption. ...
dblp:journals/iacr/PilyankevichKS19
fatcat:2vrppgmpsjelvasutirn57aqna
Searching Techniques over Encrypted Cloud Data
2019
International Journal of Computer Applications
In this paper a comparison between different kinds searchable encryption techniques according to the features of multiple keyword, amount of scale data, search complexity, accuracy, and, amount of storage ...
To preserve the secrecy of the data, the data must be encrypted. Encryption techniques play a major role when data are outsourced to the cloud, so that only the authenticated users can access. ...
[13] proposed the idea of Multi-Data-Source Dynamic Symmetric Search Encryption (MDS-DSSE), which allows each data source to generate a local index individually and enables the storage provider to combine ...
doi:10.5120/ijca2019918676
fatcat:xhtgrgaqbnhqllebjady6xddiy
« Previous
Showing results 1 — 15 out of 91 results