A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data
2016
IEEE Transactions on Information Forensics and Security
Over the last decade, privacy-preserving search over encrypted cloud data has been a meaningful and practical research topic for outsourced data security. ...
In this paper, we design a novel privacy-preserving functional encryption based search mechanism over encrypted cloud data. ...
To the best of our knowledge, our scheme is the first to achieve privacy-preserving regular language keyword search. ...
doi:10.1109/tifs.2016.2581316
fatcat:gvf4wglnqjhahbva5qfnjsflr4
Advanced Model for Keyword Search of Cloud Computing with Data Security
2023
International Journal of Research Publication and Reviews
designed to protect data in cloud computing settings. uses sophisticated encryption methods like symmetrickey, homomorphic, and attribute-based encryption to guarantee data security and secrecy. ...
Cloud computing becoming more and more widespread, safer and more effective ways to locate and retrieve data from cloud storage are needed. this research presents a sophisticated keyword-searching strategy ...
privacy-assured similarity search mechanisms over outsourced cloud data. ...
doi:10.55248/gengpi.4.1223.0134
fatcat:ahxfsfdfcfaxvo5tw37sbt6f3e
Efficient Regular Language Search for Secure Cloud Storage
2019
IJARCCE
In this paper, we propose an efficient large universe regular language search scheme for the cloud storage, which privacy is preserving and secure against the off-line keyword guessing attack (KGA). ...
A notable highlight of the proposal over other existing schemes is that it supports the regular language encryption and deterministic finite automata (DFA) based data retrieval. ...
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data In this paper, they define and solve the problem of secure ranked keyword search over encrypted cloud data. ...
doi:10.17148/ijarcce.2019.8243
fatcat:7ly3gbyos5h6dchsltye6y5pb4
Data Privacy Protection Mechanisms in Cloud
2017
Data Science and Engineering
In the cloud computing environment, the privacy of the electronic data is a serious issue that requires special considerations. ...
We have categorized the privacy-preserving approaches into four categories, i.e., privacy by cryptography, privacy by probability, privacy by anonymization and privacy by ranking. ...
It is usually used for the biometric matching and secure cloud storage.
Achieving Regular Language Search ''Regular language search'' is concerned to languages in automata. ...
doi:10.1007/s41019-017-0046-0
fatcat:cb2ok5d5jbdltffawp6hvz4j6e
Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing
2019
IEEE Access
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health ...
We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the ...
Yuan Miao and Dr. Hui Cui for their valuable comments, suggestions and reviews. ...
doi:10.1109/access.2019.2919982
fatcat:3sawv3nb5ndnncdzzk5q2anuwq
Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data
2020
Journal of Surveillance, Security and Safety
Results: In this paper, we address the problem of leakless privacy-preserving multi-keyword ranked search over encrypted cloud data (LRSE), and our new contributions address challenging problems of search ...
Hence, proposing an efficient encrypted cloud data search service would be an important step forward. ...
We explore the problem of leakless privacy preserving multi-keyword ranked search over encrypted cloud data. ...
doi:10.20517/jsss.2020.16
fatcat:v3wi3ar2wjbune4k2pzkgfw5qi
Online Data Security for Secure Cloud Storage
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The capacity benefit given by cloud server is not completely trusted by clients. In existing system, data can be modified and corrupted by the unauthorized user with the assistance of the employees. ...
It is implemented in both hardware and software. It utilizes higher length key sizes, for instance, 128, 192 and 256 bits for encryption. ...
provider could test whether the encrypted regular language in the encrypted cipher text is acceptable by the DFA embedded in the submitted search token.No plaintext from either the regular language or ...
doi:10.35940/ijitee.a1023.1191s19
fatcat:lq2h4bwgf5fkjf6xkzlsplcghi
Privacy-Preserving Computation
[chapter]
2014
Lecture Notes in Computer Science
Private data is commonly revealed to the party performing the computation on it. This poses a problem, particularly when outsourcing storage and computation, e.g., to the cloud. ...
And last, we outline research problems that need to be solved for implementing privacy-preserving computations. ...
Nevertheless, the data sent over anonymous (and authenticated) channels is rarely protected from the recipient. ...
doi:10.1007/978-3-642-54069-1_3
fatcat:sbvog74h2va6xibazies2hh3ca
Secure Data Communication in Autonomous V2X Systems
2018
2018 IEEE International Congress on Internet of Things (ICIOT)
In this paper, we propose a solution that provides (a) role-based and attribute-based access control to encrypted data and (b) encrypted search over encrypted data. ...
In this paper, we propose a solution that provides (a) role-based and attribute-based access control to encrypted data and (b) encrypted search over encrypted data. ...
to keep data confidential while allowing search over encrypted data. ...
doi:10.1109/iciot.2018.00029
dblp:conf/iciot/UlybyshevABSMO18
fatcat:q5voqszqj5fdtds6kjmuwdt53a
A Review of Functional Encryption in IoT Applications
2022
Sensors
This survey reviews the recent applications of functional encryption and the major cryptographic primitives that it covers, identifying areas where the adoption of these primitives has had the greatest ...
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms. ...
FE for Biometric Authentication, Healthcare and Cloud Applications Language Search over Encrypted Cloud Data-The authors in [128] proposed the design of a novel privacy-preserving FE-based search mechanism ...
doi:10.3390/s22197567
pmid:36236664
pmcid:PMC9573314
fatcat:slcetffyzzfffdq4gav72yvfly
An Efficient Privacy-Preserving Multi-keyword Query Scheme in Location Based Services
2020
IEEE Access
[25] defined and solved the secure ranked keyword search over encrypted cloud data. ...
Further, In [27] , based on secure inner product computation, Cao et al. proposed a preserving multi-keyword ranked search over encrypted cloud data (MRSE). ...
doi:10.1109/access.2020.3018417
fatcat:ex7svgqkrvbk5fwnj3eltk2upy
2020 Index IEEE Transactions on Cloud Computing Vol. 8
2021
IEEE Transactions on Cloud Computing
., +, TCC April -June 2020 484-494
Efficient Regular Language Search for Secure Cloud Storage. ...
., +, TCC April -June 2020 484-494
Efficient Regular Language Search for Secure Cloud Storage. ...
Frequency control Performance-Based Pricing in Multi-Core Geo-Distributed Cloud Computing. Lucanin, D., +, TCC Oct.-Dec. 2020 ...
doi:10.1109/tcc.2021.3055041
fatcat:nppinqsievad3gr42ppehwp7yi
Managing and accessing data in the cloud: Privacy risks and approaches
2012
2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
Index Terms-Privacy risks, data protection, private access, outsourced data, cloud • Data dissemination and sharing. ...
A cloud infrastructure offers several advantages to users since they can easily share and store data in a reliable system, and can have ...
Ardagna, Sushil Jajodia, Gerado Pelosi, and Stefano Paraboschi. This work was supported in part by the Italian Ministry of Research within the PRIN 2008 project "PEPPER" (2008SY2PH4). ...
doi:10.1109/crisis.2012.6378956
dblp:conf/crisis/VimercatiFS12
fatcat:iostep5swbac3owyhskrs3oi24
Integrated, Reliable and Cloud-Based Personal Health Record : A Scoping Review
2016
Health Informatics - An International Journal
Information reliability is based in ABE security-privacy mechanism. Cloud-based technology access is achieved via SOA. ...
We identified four main research topics: proposal/developed systems, PHR recommendations for development, system integration and standards, and security and privacy. ...
In [47] , the authors propose a Secure Channel Free Public-Key Encryption with Keyword Search (SCF-PEKS), which enables users to perform private searches for matching keywords over encrypted data without ...
doi:10.5121/hiij.2016.5301
fatcat:ppp33rdax5f3fhohrhhm4ua4ja
Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)
2021
Wireless Communications and Mobile Computing
analyse the data, most likely in the cloud. ...
As a result, IIoT monitoring systems should be secure, preserve the privacy, and provide real-time responses for critical decision-making. ...
Tim Storer, and Dr. Christos Anagnostopoulos for their feedback. ...
doi:10.1155/2021/5555362
fatcat:dc3spp6ydbdghd6zkku6tw5use
« Previous
Showing results 1 — 15 out of 3,140 results