Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,140 Hits in 5.0 sec

Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data

Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu
2016 IEEE Transactions on Information Forensics and Security  
Over the last decade, privacy-preserving search over encrypted cloud data has been a meaningful and practical research topic for outsourced data security.  ...  In this paper, we design a novel privacy-preserving functional encryption based search mechanism over encrypted cloud data.  ...  To the best of our knowledge, our scheme is the first to achieve privacy-preserving regular language keyword search.  ... 
doi:10.1109/tifs.2016.2581316 fatcat:gvf4wglnqjhahbva5qfnjsflr4

Advanced Model for Keyword Search of Cloud Computing with Data Security

K Ramesh Babu, D. Ram Mohan Reddy, K. Srinivasa Rao, Mamatha. N
2023 International Journal of Research Publication and Reviews  
designed to protect data in cloud computing settings. uses sophisticated encryption methods like symmetrickey, homomorphic, and attribute-based encryption to guarantee data security and secrecy.  ...  Cloud computing becoming more and more widespread, safer and more effective ways to locate and retrieve data from cloud storage are needed. this research presents a sophisticated keyword-searching strategy  ...  privacy-assured similarity search mechanisms over outsourced cloud data.  ... 
doi:10.55248/gengpi.4.1223.0134 fatcat:ahxfsfdfcfaxvo5tw37sbt6f3e

Efficient Regular Language Search for Secure Cloud Storage

Karthikeyan B, Vishaal S, Ajithkumar P
2019 IJARCCE  
In this paper, we propose an efficient large universe regular language search scheme for the cloud storage, which privacy is preserving and secure against the off-line keyword guessing attack (KGA).  ...  A notable highlight of the proposal over other existing schemes is that it supports the regular language encryption and deterministic finite automata (DFA) based data retrieval.  ...  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data In this paper, they define and solve the problem of secure ranked keyword search over encrypted cloud data.  ... 
doi:10.17148/ijarcce.2019.8243 fatcat:7ly3gbyos5h6dchsltye6y5pb4

Data Privacy Protection Mechanisms in Cloud

Niharika Singh, Ashutosh Kumar Singh
2017 Data Science and Engineering  
In the cloud computing environment, the privacy of the electronic data is a serious issue that requires special considerations.  ...  We have categorized the privacy-preserving approaches into four categories, i.e., privacy by cryptography, privacy by probability, privacy by anonymization and privacy by ranking.  ...  It is usually used for the biometric matching and secure cloud storage. Achieving Regular Language Search ''Regular language search'' is concerned to languages in automata.  ... 
doi:10.1007/s41019-017-0046-0 fatcat:cb2ok5d5jbdltffawp6hvz4j6e

Security and Privacy-preserving Challenges of e-Health Solutions in Cloud Computing

Shekha Chenthara, Khandakar Ahmed, Hua Wang, Frank Whittaker
2019 IEEE Access  
A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy preserving approaches to ensure privacy and security of electronic health  ...  We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data in the  ...  Yuan Miao and Dr. Hui Cui for their valuable comments, suggestions and reviews.  ... 
doi:10.1109/access.2019.2919982 fatcat:3sawv3nb5ndnncdzzk5q2anuwq

Leakless privacy-preserving multi-keyword ranked search over encrypted cloud data

Khosro Salmani, Ken Barker
2020 Journal of Surveillance, Security and Safety  
Results: In this paper, we address the problem of leakless privacy-preserving multi-keyword ranked search over encrypted cloud data (LRSE), and our new contributions address challenging problems of search  ...  Hence, proposing an efficient encrypted cloud data search service would be an important step forward.  ...  We explore the problem of leakless privacy preserving multi-keyword ranked search over encrypted cloud data.  ... 
doi:10.20517/jsss.2020.16 fatcat:v3wi3ar2wjbune4k2pzkgfw5qi

Online Data Security for Secure Cloud Storage

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The capacity benefit given by cloud server is not completely trusted by clients. In existing system, data can be modified and corrupted by the unauthorized user with the assistance of the employees.  ...  It is implemented in both hardware and software. It utilizes higher length key sizes, for instance, 128, 192 and 256 bits for encryption.  ...  provider could test whether the encrypted regular language in the encrypted cipher text is acceptable by the DFA embedded in the submitted search token.No plaintext from either the regular language or  ... 
doi:10.35940/ijitee.a1023.1191s19 fatcat:lq2h4bwgf5fkjf6xkzlsplcghi

Privacy-Preserving Computation [chapter]

Florian Kerschbaum
2014 Lecture Notes in Computer Science  
Private data is commonly revealed to the party performing the computation on it. This poses a problem, particularly when outsourcing storage and computation, e.g., to the cloud.  ...  And last, we outline research problems that need to be solved for implementing privacy-preserving computations.  ...  Nevertheless, the data sent over anonymous (and authenticated) channels is rarely protected from the recipient.  ... 
doi:10.1007/978-3-642-54069-1_3 fatcat:sbvog74h2va6xibazies2hh3ca

Secure Data Communication in Autonomous V2X Systems

Denis Ulybyshev, Aala Oqab Alsalem, Bharat Bhargava, Savvas Savvides, Ganapathy Mani, Lotfi Ben Othmane
2018 2018 IEEE International Congress on Internet of Things (ICIOT)  
In this paper, we propose a solution that provides (a) role-based and attribute-based access control to encrypted data and (b) encrypted search over encrypted data.  ...  In this paper, we propose a solution that provides (a) role-based and attribute-based access control to encrypted data and (b) encrypted search over encrypted data.  ...  to keep data confidential while allowing search over encrypted data.  ... 
doi:10.1109/iciot.2018.00029 dblp:conf/iciot/UlybyshevABSMO18 fatcat:q5voqszqj5fdtds6kjmuwdt53a

A Review of Functional Encryption in IoT Applications

Khurram Shahzad, Tanveer Zia, Emad-ul-Haq Qazi
2022 Sensors  
This survey reviews the recent applications of functional encryption and the major cryptographic primitives that it covers, identifying areas where the adoption of these primitives has had the greatest  ...  Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms.  ...  FE for Biometric Authentication, Healthcare and Cloud Applications Language Search over Encrypted Cloud Data-The authors in [128] proposed the design of a novel privacy-preserving FE-based search mechanism  ... 
doi:10.3390/s22197567 pmid:36236664 pmcid:PMC9573314 fatcat:slcetffyzzfffdq4gav72yvfly

An Efficient Privacy-Preserving Multi-keyword Query Scheme in Location Based Services

Shiwen Zhang, Tingting Yao, Wei Liang, Voundi Koe Arthur Sandor, Kuan-Ching Li
2020 IEEE Access  
[25] defined and solved the secure ranked keyword search over encrypted cloud data.  ...  Further, In [27] , based on secure inner product computation, Cao et al. proposed a preserving multi-keyword ranked search over encrypted cloud data (MRSE).  ... 
doi:10.1109/access.2020.3018417 fatcat:ex7svgqkrvbk5fwnj3eltk2upy

2020 Index IEEE Transactions on Cloud Computing Vol. 8

2021 IEEE Transactions on Cloud Computing  
., +, TCC April -June 2020 484-494 Efficient Regular Language Search for Secure Cloud Storage.  ...  ., +, TCC April -June 2020 484-494 Efficient Regular Language Search for Secure Cloud Storage.  ...  Frequency control Performance-Based Pricing in Multi-Core Geo-Distributed Cloud Computing. Lucanin, D., +, TCC Oct.-Dec. 2020  ... 
doi:10.1109/tcc.2021.3055041 fatcat:nppinqsievad3gr42ppehwp7yi

Managing and accessing data in the cloud: Privacy risks and approaches

Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
2012 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)  
Index Terms-Privacy risks, data protection, private access, outsourced data, cloudData dissemination and sharing.  ...  A cloud infrastructure offers several advantages to users since they can easily share and store data in a reliable system, and can have  ...  Ardagna, Sushil Jajodia, Gerado Pelosi, and Stefano Paraboschi. This work was supported in part by the Italian Ministry of Research within the PRIN 2008 project "PEPPER" (2008SY2PH4).  ... 
doi:10.1109/crisis.2012.6378956 dblp:conf/crisis/VimercatiFS12 fatcat:iostep5swbac3owyhskrs3oi24

Integrated, Reliable and Cloud-Based Personal Health Record : A Scoping Review

Jesus Romero, Pablo Lopez, Jose Luis Vazquez Noguera, Cristian Cappo, Diego P. Pinto-Roa, Cynthia Villalba
2016 Health Informatics - An International Journal  
Information reliability is based in ABE security-privacy mechanism. Cloud-based technology access is achieved via SOA.  ...  We identified four main research topics: proposal/developed systems, PHR recommendations for development, system integration and standards, and security and privacy.  ...  In [47] , the authors propose a Secure Channel Free Public-Key Encryption with Keyword Search (SCF-PEKS), which enables users to perform private searches for matching keywords over encrypted data without  ... 
doi:10.5121/hiij.2016.5301 fatcat:ppp33rdax5f3fhohrhhm4ua4ja

Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)

Jawhara Bader, Anna Lito Michala, Mohammad R. Khosravi
2021 Wireless Communications and Mobile Computing  
analyse the data, most likely in the cloud.  ...  As a result, IIoT monitoring systems should be secure, preserve the privacy, and provide real-time responses for critical decision-making.  ...  Tim Storer, and Dr. Christos Anagnostopoulos for their feedback.  ... 
doi:10.1155/2021/5555362 fatcat:dc3spp6ydbdghd6zkku6tw5use
« Previous Showing results 1 — 15 out of 3,140 results