314 Hits in 4.7 sec

A study on searchable encryption schemes

Sunitha Buchade, P.R. Devale
2018 International Journal of Engineering & Technology  
In this paper we summarize and analyze various available keyword searchable schemes based on query expressiveness and query correct-ness.  ...  This article concentrates on study of various resil-ient keyword search schemes in area of Cloud SE.  ...  Ballard, et al [4] proposed two schemes for search of conjunctive keyword over symmetrically encrypted plaintext.  ... 
doi:10.14419/ijet.v7i2.10995 fatcat:jkbeqssiyvfcbcksttcsjb5hce

Searching Techniques over Encrypted Cloud Data

Azza A., Shereen Saleh, Passent Elkafrawy
2019 International Journal of Computer Applications  
In this paper a comparison between different kinds searchable encryption techniques according to the features of multiple keyword, amount of scale data, search complexity, accuracy, and, amount of storage  ...  This study focuses on different searching techniques over the encrypted data in cloud.  ...  Conjunctive Keyword Search The goal of a conjunctive keyword search (CKS) is to enable the user to ask a conjunctive keyword query to the server, so that the server can test which encrypted data contains  ... 
doi:10.5120/ijca2019918676 fatcat:xhtgrgaqbnhqllebjady6xddiy

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage

Liang Hu, Tengfei Li, Yan Li, Jianfeng Chu, Hongtu Li, Hongying Han
2015 Journal of Communications  
In cloud computing, users usually outsource their private data to the cloud storage to save the local storage space and reduce the management costs.  ...  Searchable Encryption (SE) is a recently developed cryptographic primitive that supports keyword search over encrypted data, which enables users to encrypt their sensitive data and store it to the remote  ...  In [24] , Golle et al. defined two protocols for conjunctive keyword search over encrypted data, for which for which it is provably hard for the server to distinguish between the encrypted keywords of  ... 
doi:10.12720/jcm.10.10.766-772 fatcat:n7w4sknts5bt7by3ym65p4eu5e

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation

Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
In this paper, we focus on the malicious cloud model and propose a new verifiable searchable symmetric encryption scheme.  ...  SSE has practical application in cloud storage, where a client outsources his encrypted data to a cloud server while maintaining the searchable ability over his data.  ...  (iO-based Searchable Symmetric Encryption).  ... 
doi:10.1145/2714576.2714623 dblp:conf/ccs/ChengYGZR15 fatcat:blrw4uyrwzhkrb3f5w4prym6di

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability [chapter]

Zhangjie Fu, Jiangang Shu, Xingming Sun
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Although the existing searchable encryption schemes enable users to search over encrypted data, these schemes support only exact keyword search, which greatly affects data usability.  ...  For protecting data privacy, sensitive data are always encrypted before being outsourced.  ...  Related Work Symmetric Searchable Encryption: The first construction of symmetric searchable encryption (SSE) was proposed by Song et al.  ... 
doi:10.1007/978-3-319-23829-6_4 fatcat:sjopp55arzaelmv3lwx7lcwlhe

Cryptographic Cloud Storage [chapter]

Seny Kamara, Kristin Lauter
2010 Lecture Notes in Computer Science  
We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage.  ...  We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer.  ...  In the following we describe each type of scheme in more detail. Symmetric searchable encryption.  ... 
doi:10.1007/978-3-642-14992-4_13 fatcat:6ymmru7sfnbrfivde6pqvfxstu

Implementation of E-Health Cloud System Using Timing Enabled Proxy Re-encryption function (Re-dtPECK)

U.Sarath priyan, V.D.Ambeth kumar
2017 International Journal of MC Square Scientific Research  
Also, the length of the time period can be controlled for the delegatee to search and decrypt delegator's encrypted documents.  ...  The major feature is it supports the conjunctive keywords search and resist the keyword guessing attacks. By this, only the designated tester can provide exsistence to certain keywords.  ...  The keywords are once again encrypted and stored as secure searchable indexes and directly stored in the cloud server for retrieval purpose by the doctor or patient.  ... 
doi:10.20894/ijmsr. fatcat:y4c34gi6wvaqbfzqfoh356qyzy

VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage [article]

Chan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
2020 IACR Cryptology ePrint Archive  
Searchable Symmetric Encryption(SSE) remains to be one of the hot topics in the field of cloud storage technology.  ...  Therefore, verifiable searchable encryption emerged. In the meantime, single-keyword query limits the applications of searchable encryption.  ...  PCL2018KP004), and in part by "the Fundamental Research Funds for the Central Universities". Xiaolei Dong and Jiachen Shen are the corresponding authors.  ... 
dblp:journals/iacr/FanDCS20 fatcat:qkuijxf4crgpbb5zm2xuelfjh4

Towards Privacy-Preserving Cloud Storage: A Blockchain Approach

Jia-Shun Zhang, Gang Xu, Xiu-Bo Chen, Haseeb Ahmad, Xin Liu, Wen Liu
2021 Computers Materials & Continua  
The privacy data is encrypted and stored in a cloud server, while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.  ...  However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing.  ...  According to the encryption method, Searchable Encryption can be divided into Symmetric Searchable Encryption (SSE) and Public key Encryption with Keyword Search (PEKS). In 2000, Song et al.  ... 
doi:10.32604/cmc.2021.017227 fatcat:rgyiafzxw5dtrnzvdn2627n3xu

A Privacy-Preserving Protocol for Verifiable File Search on the Cloud

Most of these methods are restricted to the handling of a single keyword query.  ...  It should always be encrypted before cloud outsourcing to preserve the privacy of personal documents that are stored in the cloud environment.  ...  Second, the current searchable reversed index-based systems do not promote multi-keyword conjunctive search, which is now the most prevalent type of query a day.  ... 
doi:10.35940/ijitee.f1099.0486s419 fatcat:msz43agpunfvpe753yw4bw2xka

A Multi Keyword Searchable Attribute-based Encryption Technique for Data Access Control in Cloud Storage

Prashant Mininath Mane
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Multi Authority Cipher-text-policy Attribute-Based Encryption (MA-C-ABE) scheme is a modern form of basic cryptographic and data encryption, which is useful for data cloud storage for fine-grained access  ...  Multi-Keyword searchable encryption process allows legitimate users to quickly identify useful data stored in a cloud server without disclosing the searched keywords relevant data.  ...  CONCLUSION In this paper, it proposed a Multi-keyword searchable attribute-based encryption system with data access control for cloud storage.  ... 
doi:10.30534/ijatcse/2020/104942020 fatcat:6pzotrjewzex3d6iulj6xpyo3q

Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data

Shuai Li, Miao Li, Haitao Xu, Xianwei Zhou
2019 Sensors  
In this paper, we deal with the protection of big data privacy in the data storage phase and propose a searchable encryption scheme satisfying personalized privacy needs.  ...  Our proposed scheme works for all file types including text, audio, image, video, etc., and meets different privacy needs of different individuals at the expense of high storage cost.  ...  [16] proposed an SSE scheme that supports conjunctive search and general Boolean queries on outsourced symmetrically encrypted data; Salam et al.  ... 
doi:10.3390/s19051059 fatcat:vgft5u7njnd2bf2avjowhtu2xa

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications [chapter]

Wei Song, Yihui Cui, Zhiyong Peng
2015 Lecture Notes in Computer Science  
In this paper, we propose a new full-text retrieval algorithm over the encrypted data for the scenario of cloud storage, in which all the words in a document have been extracted and built a privacy-preserved  ...  It will greatly undermine the advantage of the cloud storage. For example, a user encrypts his personal data before uploading them to the cloud.  ...  It only supports single-keyword search, and encrypts documents and queries with a one-to-many OPSE (Order Preserving Symmetric Encryption) scheme [21] and utilizes keyword frequency to rank query results  ... 
doi:10.1007/978-3-319-25207-0_20 fatcat:kzb3wzkdzvdvdauq2pvqxl5664

User Verifiable Multiple Keyword Search Scheme using the Merkle Tree for Outsourced Data in the Cloud

Devi Thiyagarajan, Ganesan R
2017 International Journal of Technology  
Cloud computing has revolutionized the IT industry by offering huge storage for data outsourcing and also for computation.  ...  The paper proposes a user verifiable multi-keyword search scheme, which focuses on: (i) construction of inverted index for the documents with keywords; (ii) index and document encryption by HECC; (iii)  ...  The verifiable conjunctive keyword search scheme proposed by Cheng et al. (2015) also makes use of symmetric searchable encryption.  ... 
doi:10.14716/ijtech.v8i4.9475 fatcat:4jo7puwikve4jjv2zn55jehpkm

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
To address this issue, searchable encryption is a novel cryptographic primitive that enables user to search queries over encrypted data stored on an untrusted server while guaranteeing the privacy of the  ...  With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality.  ...  PEKS Based on Public Key Infrastructure (PEKS-PKI) To resolve secret key management and distribution in symmetric searchable encryption, the PEKS was proposed.  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq
« Previous Showing results 1 — 15 out of 314 results