Filters








91 Hits in 4.8 sec

Storage Efficient Substring Searchable Symmetric Encryption

Iraklis Leontiadis, Ming Li
2018 Proceedings of the 6th International Workshop on Security in Cloud Computing - SCC '18  
We revisit the work of substring searchable encryption in order to reduce the storage cost of auxiliary data structures.  ...  We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur.  ...  In this paper we design and analyze a storage efficient Substring Searchable Symmetric Encryption (S 3 E) protocol with variable size of substrings.  ... 
doi:10.1145/3201595.3201598 dblp:conf/ccs/LeontiadisL18 fatcat:h666zdxouzabtovpf3o37mfdia

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

Mikhail Strizhov, Zachary Osman, Indrajit Ray
2016 Future Internet  
In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap.  ...  Our solution efficiently finds occurrences of a given substring over encrypted cloud data.  ...  We formally define a Multi-User Substring Position Searchable Symmetric Encryption (MSSP-SSE) and present an efficient construction.  ... 
doi:10.3390/fi8030028 fatcat:5c4lrleskvfkvcwk3eqc2rvnru

Substring-Searchable Symmetric Encryption

Melissa Chase, Emily Shen
2015 Proceedings on Privacy Enhancing Technologies  
First, we formalize an encryption paradigm that we call queryable encryption, which generalizes searchable symmetric encryption (SSE) and structured encryption.  ...  Then, we construct a queryable encryption scheme for substring queries. Our construction uses suffix trees and achieves asymptotic efficiency comparable to that of unencrypted suffix trees.  ...  Substring-searchable symmetric encryption We define substring-searchable encryption as a special case of queryable encryption. Definition 4.2.  ... 
doi:10.1515/popets-2015-0014 dblp:journals/popets/ChaseS15 fatcat:ok24piheijfhpc524okcy7qn2y

Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing
IJARCCE - Computer and Communication Engineering

Mr. H.D. Gadade, Miss.Pranita U. Shinganwade, Miss. Punam S. Wanare, Miss. Vibha Badhe
2015 IJARCCE  
Searchable Symmetric Encryption (SSE) use to secure and retrieve data from the cloud and it also focus on addressing data privacy issues.  ...  To remove the leakage of data, we propose Two Round Searchable Encryption (TRSE) scheme that supports top-k multi-keyword retrieval. In TRSE, we use Vector Space Model & Homomorphic Encryption.  ...  TRSE DESIGN Existing Searchable Symmetric Encryption (SSE) scheme works server-side ranking based on Order Preserving Encryption (OPE) to improve the efficiency of retrieval of encrypted cloud data.  ... 
doi:10.17148/ijarcce.2015.4338 fatcat:3yvwu7kjmvhslfjyazho4lof6q

Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud

Fan Yin, Rongxing Lu, Yandong Zheng, Xiaohu Tang, Qi Jiang
2021 Security and Communication Networks  
Searchable symmetric encryption (SSE) is a popular solution that can support efficient attribute queries over encrypted datasets in the cloud.  ...  This paper aims to address this issue by proposing an efficient and privacy-preserving SSE scheme supporting compound substring queries.  ...  For balancing the leakage and efficiency, many studies focus on searchable symmetric encryption (SSE). Song et al.  ... 
doi:10.1155/2021/7941233 fatcat:4zun3r32wrg4hfveqw6avfm2si

Embedding edit distance to enable private keyword search

Julien Bringer, Hervé Chabanne
2012 Human-Centric Computing and Information Sciences  
Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods: We adapt results on private identification schemes by Bringer et al. to this new context.  ...  Symmetric Searchable Encryption (SSE) as introduced by [2] relies on symmetric encryption primitives for efficiency reasons.  ...  The main goal of searchable encryption [2, 25] is to store messages into an encrypted database while still enabling to search the messages related to some keywords.  ... 
doi:10.1186/preaccept-1253053215890607 fatcat:4row4c54wrfdvanjd7sadxmswq

Substring-searchable attribute-based encryption and its application for IoT devices

Xi Sun, Hao Wang, Xiu Fu, Hong Qin, Mei Jiang, Likun Xue, Xiaochao Wei
2020 Digital Communications and Networks  
In this paper, a new kind of Attribute-Based Encryption (ABE) scheme, which is called the Sub-String Searchable ABE (SSS-ABE) scheme, is proposed for the sharing and querying of the encrypted data.  ...  The data user can make a substring query on the whole ciphertext without setting keywords in advance.  ...  To solve this problem, Chase and Shen [25] studied the substring searchable symmetric encryption and proposed the concept of queryable encryption, which can query substrings on the ciphertext.  ... 
doi:10.1016/j.dcan.2020.07.008 fatcat:53z5aeqx7rdapnhgajsmoz2zzu

Privacy-Preserving Substring Search on Multi-source Encrypted Gene Data

Shiyue Qin, Fucai Zhou, Zongye Zhang, Zifeng Xu
2020 IEEE Access  
Most existing solutions for the privacy-preserving substring search problem are based on searchable encryption.  ...  The analyses show that our scheme is secure and efficient for substring search on multi-source encrypted gene data.  ...  Chase and Shen [6] utilized the suffix tree and the deterministic symmetric single-user SE to perform an efficiency substring search. However, the search pattern is leaked.  ... 
doi:10.1109/access.2020.2980375 fatcat:f3ycj34nijhtxinaho367fdoai

A study on searchable encryption schemes

Sunitha Buchade, P.R. Devale
2018 International Journal of Engineering & Technology  
To overcome this contradiction, searchable encryption notion was introduced.  ...  To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers.  ...  The two main dimensions of SE are Symmetric or private key Searchable encryption (SSE) and asymmetric or public key Searchable encryption with keyword search (PEKS).  ... 
doi:10.14419/ijet.v7i2.10995 fatcat:jkbeqssiyvfcbcksttcsjb5hce

USING DIFFERENT SEARCHING SCHEMAS FOR FUZZY KEYWORD SEARCH OVER CLOUD DATA

SYEDA FARHA SHAZMEEN, RANGARAJU DEEPIKA
2013 Graduate Research in Engineering and Technology  
So there comes the importance of encrypted cloud data search Traditional keyword search was based on plaintext keyword search, but for protecting data privacy the sensitive data should be encrypted before  ...  Three different Fuzzy Search Schemas, The wild card method, gram based method and tree traverse search scheme, are dicussed and also the efficiency of these algorithms is analyzed.  ...  Fig. 1.Searchable Symmetric Encryption Fuzzy keyword search will return the results by keeping the following two rules. 1.  ... 
doi:10.47893/gret.2013.1027 fatcat:6ckhq5wonzdxhgfexdw2mnefia

FPGA-accelerated Searchable Encrypted Database Management Systems for Cloud Services

Mitsuhiro Okada, Takayuki Suzuki, Naoya Nishio, Hasitha Waidyasooriya, Masanori Hariyama
2020 IEEE Transactions on Cloud Computing  
Because searchable encryption allows query execution over encrypted data in the cloud, sensitive data can be securely stored there in the cloud.  ...  DBMSs that use searchable encryption have been investigated with regard to ensuring their security.  ...  We use Symmetric Searchable Encryption (SSE), proposed by Yoshino et al [29] .  ... 
doi:10.1109/tcc.2020.2969655 fatcat:bt3n6g475vczxijjkzoayy2pum

Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage

Geong Poh, Vishnu Baskaran, Ji-Jian Chin, Moesfa Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Z'aba
2017 Algorithms  
To resolve this problem, we propose a multi-server searchable symmetric encryption (SSE) scheme and construct a system called the searchable data vault (SDV).  ...  A simple solution is for the user to encrypt all documents before submitting them. This method, however, makes it impossible to efficiently search for documents as they are all encrypted.  ...  The controller is designed in such a way that the underlying searchable symmetric encryption (SSE) scheme, utilized for efficient search, is "pluggable".  ... 
doi:10.3390/a10020052 fatcat:r6bciv5aizfvjahbhmcfl3ceve

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud

Chang Liu, Liehuang Zhu, Jinjun Chen
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
Searchable Symmetric Encryption (SSE) is an advanced cryptographic primitive addressing the above issue, which maintains efficient keyword search over encrypted data without disclosing much information  ...  Subsequent privacy risks force data owners to encrypt sensitive data, hence making the outsourced data no longer searchable.  ...  To address this issue, an advanced cryptographic primitive has been proposed, commonly known as Searchable Symmetric Encryption (SSE).  ... 
doi:10.1109/trustcom.2015.406 dblp:conf/trustcom/LiuZC15 fatcat:x6cwokg42fesbiuiulmez37ct4

Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes [article]

Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
2019 IACR Cryptology ePrint Archive  
with the encrypted data on the storage provider.  ...  Searchable encryption (SE) is a class of cryptographic techniques that addresses these issues.  ...  ACKNOWLEDGEMENTS The authors would primarily like to thank Scott Arciszewski and his project CipherSweet for the implementation of the blind indexing approach to searchable encryption.  ... 
dblp:journals/iacr/PilyankevichKS19 fatcat:2vrppgmpsjelvasutirn57aqna

Searching Techniques over Encrypted Cloud Data

Azza A., Shereen Saleh, Passent Elkafrawy
2019 International Journal of Computer Applications  
In this paper a comparison between different kinds searchable encryption techniques according to the features of multiple keyword, amount of scale data, search complexity, accuracy, and, amount of storage  ...  To preserve the secrecy of the data, the data must be encrypted. Encryption techniques play a major role when data are outsourced to the cloud, so that only the authenticated users can access.  ...  [13] proposed the idea of Multi-Data-Source Dynamic Symmetric Search Encryption (MDS-DSSE), which allows each data source to generate a local index individually and enables the storage provider to combine  ... 
doi:10.5120/ijca2019918676 fatcat:xhtgrgaqbnhqllebjady6xddiy
« Previous Showing results 1 — 15 out of 91 results