Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








650 Hits in 4.4 sec

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability [chapter]

Zhangjie Fu, Jiangang Shu, Xingming Sun
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Although the existing searchable encryption schemes enable users to search over encrypted data, these schemes support only exact keyword search, which greatly affects data usability.  ...  To tackle the challenge, a smart semantic search scheme is proposed in this paper, which returns not only the result of keyword-based exact match, but also the result of keyword-based semantic match.  ...  Our contributions in this paper can be summarized as follows: (1) We propose a keyword-based semantic search scheme over encrypted data by building a semantic tree in real time, which can enable cloud  ... 
doi:10.1007/978-3-319-23829-6_4 fatcat:sjopp55arzaelmv3lwx7lcwlhe

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

Gladiss Merlin. N
2017 International Journal of Scientific Research and Management  
Cloud computing enables the paradigm of data outsourcing.  ...  Even though searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data  ...  Therefore encryption before data outsourcing the cloud data; this, however, obsoletes the traditional data utilization service based on plaintext keyword search.  ... 
doi:10.18535/ijsrm/v5i12.06 fatcat:zqne5kvarzdw7pgeizjwbztmpm

Indexing Encrypted Documents for Supporting Efficient Keyword Search [chapter]

Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo, Sharad Mehrotra
2012 Lecture Notes in Computer Science  
It is an Internet-based computing. Around there shared assets, information and data are given on request to PCs and different gadgets. It additionally gives the administrations over the web.  ...  One test is that the connection between records will be ordinarily hidden during the time spent encryption, which will prompt critical inquiry precision execution debasement.  ...  ,"Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud on distributed computing systems,June 2011,pages 383-392 [3]  ... 
doi:10.1007/978-3-642-32873-2_7 fatcat:db5clyueznbatnamncxj5ftwju

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking

Zhihua Xia, Yanling Zhu, Xingming Sun, Lihong Chen
2014 Journal of Cloud Computing: Advances, Systems and Applications  
In view of the deficiency, as an attempt, we propose a semantic expansion based similar search solution over encrypted cloud data.  ...  However, the privacy information has to be encrypted to guarantee the security. To implement efficient data utilization, search over encrypted cloud data has been a great challenge.  ...  Design goals To enable effective and secure ranked semantic expansion search over outsourced cloud data under the aforementioned model, our mechanism should achieve the following design goals. 1) Ranked  ... 
doi:10.1186/s13677-014-0008-2 fatcat:yt2x7up4ffggffbfqclfrpznje

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking

Zhihua Xia, Yanling Zhu, Xingming Sun, Lihong Chen
2014 Journal of Cloud Computing: Advances, Systems and Applications  
In view of the deficiency, as an attempt, we propose a semantic expansion based similar search solution over encrypted cloud data.  ...  However, the privacy information has to be encrypted to guarantee the security. To implement efficient data utilization, search over encrypted cloud data has been a great challenge.  ...  Design goals To enable effective and secure ranked semantic expansion search over outsourced cloud data under the aforementioned model, our mechanism should achieve the following design goals. 1) Ranked  ... 
doi:10.1186/preaccept-1025135849106903 fatcat:mk574gwogjg37puylq4mddkliy

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities

Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
In particular, we focus on two representative types of flexible search functionalities: ranked keyword search, and search over structured data.  ...  In this position paper, we identify the importance and challenges of designing privacyassured, flexible and practically efficient search mechanisms for outsourced cloud data services.  ...  Thus, enabling similarity searches over encrypted graphs is another important functionality for outsourced graph-structured data.  ... 
doi:10.1109/icdcsw.2012.41 dblp:conf/icdcsw/LiYLH12 fatcat:etuikjcsv5dgbgoiya7rkms5je

Achieving Universal Assured Fine-Grained Query Result Verification for Secure Search Scheme over Encrypted Cloud Data

Mrs.N.Hari preethi, Mr.V.Gnana sekar, Mr.K. Sathish
2020 International journal of science and management studies  
Secure pursuit strategies over encoded cloud information enable an approved client to inquiry information documents of enthusiasm by submitting scrambled question catchphrases to the cloud server in a  ...  Moreover, a short mark strategy with greatly little stockpiling cost is proposed to ensure the credibility of confirmation protest and a check question ask for method is introduced to enable the inquiry  ...  We propose a global change over that transform any incognito identity-based encryption (IBE) into a safe PEFKS scheme.  ... 
doi:10.51386/25815946/ijsms-v3i3p113 fatcat:sli3wcaxqjbxtapsxx3iw3fpvy

A MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED BASED ON HIERARCHICAL CLUSTERING INDEX

A. Indhuja, T.P.Udaya shankar, R.M Balajee Mastan Vali Shaik, P Sujatha
2017 International Journal on Smart Sensing and Intelligent Systems  
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to  ...  Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme. A multi-keyword ranked search scheme over encrypted based on hierarchical clustering index 540  ...  Searchable encryption schemes enable the client to store the encrypted data to the cloud and execute keyword search over cipher text domain.  ... 
doi:10.21307/ijssis-2017-269 fatcat:rg7oynvtqre7hb2vxtjsl6dpn4

Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption

Redwan Walid, Karuna P. Joshi, Seung Geol Choi, Dae-young Kim
2020 2020 IEEE International Conference on Big Data (Big Data)  
As the volume of cloud-based EHRs reaches Big Data levels, it is essential to search over these encrypted patient records without decrypting them to ensure that the medical caregivers can efficiently access  ...  In this paper, we present our novel approach that facilitates searchable encryption of large EHR systems using Attribute-based Encryption (ABE) and multi-keyword search techniques.  ...  To support keyword search, we employ the attribute-based searchable encryption scheme [31] , [24] that enables a user to create a small data (called a token) that is associated with a keyword she is  ... 
doi:10.1109/bigdata50022.2020.9378002 fatcat:rdhtvkjhcrbjhhgawq2b7lqfae

Efficiently Data Analysis and Transmission for consumer using grid computing

Sindhuja R, Vasuinthira N
2018 International Journal of Trend in Scientific Research and Development  
First investigate the consistency between the characteristics of big data and smart grid data.  ...  A propose a hybrid approach for storage planning, which consists of an outer optimization based on genetic and an inner optimization algorithm for energy scheduling.  ...  Therefore, it is a very important and challenging task to implement semantic search over encrypted data.  ... 
doi:10.31142/ijtsrd10991 fatcat:uay47xnawjci5fs6e6wrlf34si

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou
2011 2011 Proceedings IEEE INFOCOM  
But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search.  ...  Thus, enabling an encrypted cloud data search service is of paramount importance.  ...  To enable the searching capability over C for effective data utilization, the data owner, before outsourcing, will first build an encrypted searchable index I from F, and then outsource both the index  ... 
doi:10.1109/infcom.2011.5935306 dblp:conf/infocom/CaoWLRL11 fatcat:nqnaxxzkazatzdb7lfxg56n3yy

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing [article]

P. Naga Aswani, K. Chandra Shekar
2012 arXiv   pre-print
We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets.  ...  Extensive experimental results demonstrate the efficiency of the proposed solution.  ...  fuzzy keyword search over encrypted cloud data.  ... 
arXiv:1211.3682v1 fatcat:zjmz3pne6zdszfymzfkwq5pntm

B2EIS-RG: Biometric-based Bucket Encrypting Index Structure with Random Generator

Sudharani K, Sakthivel N K, Subasree S
2019 International Journal of Advanced Trends in Computer Science and Engineering  
The proliferation in the popularity of the cloud-based data storage services motivated the data owners to store a huge amount of confidential files on the remote servers in an encrypted format.  ...  This paper presents a combined Biometric-based Bucket Encrypting Index Structure with Random Generator (B2EIS-RG) for efficient and privacy-preserving biometric identification outsourcing in the cloud.  ...  [31] designed a novel central keyword scheme with the semantic extension ranked scheme.  ... 
doi:10.30534/ijatcse/2019/10822019 fatcat:akwqvvvvqvhf7o4eglvsls56cu

Encrypted Video Search with Single/Multiple Writers

Yu Zheng, Wenchao Zhang, Wei Song, Xiuhua Wang, Chong Fu
2024 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
We initiate the study of scalable encrypted video search, enabling clients to query videos similar to an image search.  ...  Although retrieving (unencrypted) videos has been extensively investigated, retrieving encrypted multimedia has received relatively rare attention, at best in a limitation of image-based similarity searches  ...  E-DSSE provides epoch-based forward privacy by searching over data encrypted from the system initialization to . and an encrypted token set ETkn .  ... 
doi:10.1145/3643887 fatcat:27gjzkmkmraxjlq7dnzmbmxcpa

Authorized Private Keyword Search over Encrypted Data in Cloud Computing

Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
2011 2011 31st International Conference on Distributed Computing Systems  
, and establish a scalable framework for Authorized Private Keyword Search (APKS) over encrypted cloud data.  ...  Encryption is a promising way to protect the confidentiality of the outsourced data, but it also introduces much difficulty to performing effective searches over encrypted information.  ...  should allow multiple owners to encrypt and contribute data, while enabling a large number of users to search over multiple owners' data.  ... 
doi:10.1109/icdcs.2011.55 dblp:conf/icdcs/LiYCL11 fatcat:iidjk26ux5f7fm4dpmgyacdxam
« Previous Showing results 1 — 15 out of 650 results