Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








307 Hits in 4.7 sec

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data [article]

Xueyan Liu, Zhitao Guan, Xiaojiang Du, Liehuang Zhu, Zhengtao Yu, Yinglong Ma
2018 arXiv   pre-print
In ESAS, by integrating PRSCG (the privacy-preserving ranked search based on con-ceptual graph) and CP-ABE (ciphertext policy attribute-based encryption), semantic search with file-level fine-grained access  ...  To address the above issues, ESAS, an Efficient Semantic and Authorized Search scheme over encrypt-ed outsourced data, is proposed.  ...  The most advanced smart semantic search scheme over encrypted outsourced data PRSCG [1] employees Conceptual Graph (CG) [2] as its' semantic carrier, which is a perfect and mature manifestation of  ... 
arXiv:1811.06917v1 fatcat:ruscqxjdr5c7dkfm4y7l26z5aa

A Light Weight Cryptographic Technique for Secure Outsourcing and Retrieval of Data in Cloud Computing

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
It is still an open challenge to develop light weight cryptographic methods for secure storage and retrieval or search for outsourced encrypted data.  ...  An algorithm named Hybrid Lightweight Data Encryption (HLDE) is proposed and implemented. Empirical study is made on the same to validate our approach.  ...  Conceptual graphs over encrypted data is used for semantic search as explored by Fu et al. [19] . Fu et al. [3] on the other hand proposed a method to have content aware search over cloud data.  ... 
doi:10.35940/ijitee.j1073.0881019 fatcat:rjret5kfh5bwdfoipqn34tnksm

Secure Ranked Multi-Keyword Search based on Modified Blowfish Algorithm and AVL Tree in Untrusted Cloud Environment

2019 International Journal of Engineering and Advanced Technology  
To achieve a proficient search, every data owner's index based on AVL tree is encrypted by way of additive order and the privacy-preserving family is formed.  ...  In this paper, ranked multi keyword search based on AVL tree, especially for several data owners, has been proposed.  ...  To resolve the problem in the privacy-preserving smart semantic search based on CGs, the proposed scheme uses PRSCG and PRSCG-TF schemes [6] .  ... 
doi:10.35940/ijeat.a2041.109119 fatcat:jom2eqwnafhvxdyd27cf7bh3hq

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing

2020 International journal of recent technology and engineering  
Conventional security assurance plans are normally founded on encryption innovation, yet these sorts of strategies can't viably oppose assault from within cloud server.  ...  At the end of the day, clients lose their privilege of control on information and face security spillage chance.  ...  Semantic Search Based on Conceptual Graphs over Outsourced Encryption Data AUTHOR: Zhangjie Fu ; Fengxiao Huang YEAR: 2017 DESCRIPTION:Accessible encryption is a significant research zone in distributed  ... 
doi:10.35940/ijrte.f7377.038620 fatcat:l4jtgicglrgt5ixizocsmwuaze

Demystifying User Data Privacy in the World of IOT

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Thus analyzing the framework of IOT from the perspective of user data protection is a very crucial self-test which is required for IoT implementation.  ...  Often the term security and privacy are used interchangeably, but in the IoT environment, both these concept would play a crucial but differentiating role.  ...  Swapping techniques by [8] [9] . 2) Privacy preserving database outsourcing With the advent of efficient cloud computing technologies, many applications now prefer to outsource there databases on the  ... 
doi:10.35940/ijitee.j9835.0881019 fatcat:6oygcxohi5fpthd7lw6i2fjwyy

Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data [article]

Sahan Ahmad, SM Zobaed, Raju Gottumukkala, Mohsen Amini Salehi
2019 arXiv   pre-print
Nonetheless, user-side encryption limits the ability to process (e.g., search) encrypted data on the cloud.  ...  This has raised security and privacy concerns for many organizations (users) with sensitive data to utilize cloud-based solutions.  ...  Our threat model considers internal and/or external attacks to privacy of the outsourced cloud data and the goal is to preserve the data privacy.  ... 
arXiv:1908.03668v1 fatcat:pkomkyjp6rchvbwry4znfindra

Revealing the Landscape of Privacy-Enhancing Technologies in the Context of Data Markets for the IoT: A Systematic Literature Review [article]

Gonzalo Munilla Garrido and Johannes Sedlmeir and Ömer Uludağ and Ilias Soto Alaoui and Andre Luckow and Florian Matthes
2022 arXiv   pre-print
We conclude that privacy-enhancing technologies need further improvements to positively impact data markets so that, ultimately, the value of data is preserved through data scarcity and users' privacy  ...  Despite considerable research focused on different aspects of privacy-enhancing data markets for the IoT, none of the solutions proposed so far seems to find a practical adoption.  ...  Acknowledgements We would like to thank the Bayerisches Forschungsinstitut für Digitale Transformation for supporting our research on differential privacy, and the Bavarian Ministry of Economic Affairs  ... 
arXiv:2107.11905v2 fatcat:fy4fa4gvubcqzfv2wollbigbae

AI-Driven Confidential Computing across Edge-to-Cloud Continuum [article]

SM Zobaed
2023 arXiv   pre-print
Our trusted enterprise search service named SAED, provides context-aware and personalized semantic search over confidential data across the continuum.  ...  We present our approach to make confidential data clustering on the cloud, and then develop confidential search service across edge-to-cloud for unstructured text data.  ...  adapted to big data aspects [53, 3, 52, 1, 54]. 2.2.3 Privacy-Preserving Cloud-based Search Systems In addition to plain-text data, searching is performed on privacy-preserving data ensuring negligible  ... 
arXiv:2301.00928v1 fatcat:7skmkpw5zjhjbmf2wmzzjw4zku

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
They can be merged to form a new and essential platform in crowdsourcing IoT paradigm for data collection from different sources and communication mediums.  ...  This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT  ...  The authors presented AnonySense, a general architecture focusing on privacy-aware mobile crowdsourcing.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

Digital Privacy Under Attack: Challenges and Enablers [article]

Baobao Song, Mengyue Deng, Shiva Raj Pokhrel, Qiujun Lan, Robin Doss, Gang Li
2023 arXiv   pre-print
Therefore, a holistic survey to compare the discovered techniques on attacks over privacy preservation and their mitigation schemes is essential in the literature.  ...  Second, we comprehensively cover major privacy attacks targeted at anonymous data, statistical aggregate data, and privacy-preserving models.  ...  For example, location-based service combines users' location data with smart applications to provide services on demand [41] .  ... 
arXiv:2302.09258v1 fatcat:mvmqjtt7azhm3bvjq37uj5yjeu

Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges and Solutions

Pan Jun Sun
2019 IEEE Access  
In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and reputation, but they are scattered and lack unified  ...  INDEX TERMS Cloud computing, privacy, access control, attribute-based encryption, trust. 147420 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  Reference [89] proposed a fuzzy keyword search scheme based on similar semantics of editing distance.  ... 
doi:10.1109/access.2019.2946185 fatcat:tbg5a25f5rd3je4mogemegrvje

2021 Index IEEE Transactions on Knowledge and Data Engineering Vol. 33

2022 IEEE Transactions on Knowledge and Data Engineering  
., +, TKDE Nov. 2021 3607-3617 Data privacy A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing.  ...  ., +, TKDE Jan. 2021 1-13 A Novel Privacy Preserving Framework for Large Scale Graph Data Pub-lishing.  ... 
doi:10.1109/tkde.2021.3128365 fatcat:4m5kefreyrbhpb3lhzvgqzm3qu

Recent trends towards privacy‐preservation in Internet of Things, its challenges and future directions

Mahdi Safaei Yaraziz, Ahmad Jalili, Mehdi Gheisari, Yang Liu
2022 Zenodo  
[15] suggested a lightweight attribute-based searchable encryption (LABSE) system in smart healthcare for resource-constrained devices that achieves fine-grained access control and keyword search while  ...  As a result, privacy could be preserved by splitting sensitive data and sending it over a secure route and VPN.  ...  However, methods based on Data Minimisation can be a great help to these networks for privacy. The limitation of data leakage can be achieved directly by minimising data.  ... 
doi:10.5281/zenodo.7503222 fatcat:schwtuw535h2zjfkqhhzdlbjxi

A framework for privacy-preserving data sharing in the Smart Grid

Khalid Alharbi, Xiaodong Lin, Jun Shao
2014 2014 IEEE/CIC International Conference on Communications in China (ICCC)  
[45] propose a searchable and privacy-preserving data access control system over outsourced cloud data by using searchable encryption. Recently, Shao et al.  ...  An efficient and privacy-preserving downlink communication scheme for smart grid based on identity-based signcryption is also proposed in order to protect consumers privacy.  ... 
doi:10.1109/iccchina.2014.7008274 dblp:conf/iccchina/AlharbiLS14 fatcat:updxhhwzzveubptzfxg5vkysfe

Cloud-based Smart CDSS for chronic diseases

M. Hussain, A. M. Khattak, W. A. Khan, I. Fatima, M. B. Amin, Z. Pervez, R. Batool, M. A. Saleem, M. Afzal, M. Faheem, M. H. Saddiqi, S. Y. Lee (+1 others)
2013 Health and Technology  
For example, social media data are captured for a diabetic patient from his/her social interactions on Twitter, e-mail, and Trajectory and then combined with clinical observations from real encounters  ...  The system generates recommendations based on physicians' guidelines provided at the hospital during patient follow-ups.  ...  With anonymous data outsourced, there is no need to encrypt data in order to achieve data privacy.  ... 
doi:10.1007/s12553-013-0051-x fatcat:twqwd6zeefbzxewavny5ftfasm
« Previous Showing results 1 — 15 out of 307 results