The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Location-Based Services (LBSs) have attracted a lot of attention in recent years. For privacy concerns, there are abundant works focusing on the secure query over the location server. However, these works suffer from two main limitations. First, they cannot preserve the location privacy and content privacy simultaneously during LBS queries. Second, they do not support the ranked queries. In this...
With the advantages of vehicle networks, cloud computing, Vehicle Cloud Computing (VCC) has emerged, wins a lot of interests. In this paper, we propose an attack detection scheme in the VCC, that can detect the potential attacks launched by malicious vehicles, while preserving benign vehicles' privacy. First of all, we propose a distributed secret key distribution scheme, where multiple authorities...
Data deduplication is commonly adopted in cloud storage services to improve storage utilization and reduce transmission bandwidth. It, however, conflicts with the requirement for data confidentiality offered by data encryption. Hierarchical authorized deduplication alleviates the tension between data deduplication and confidentiality and allows a cloud user to perform privilege-based duplicate checks...
In a Dynamic Verifiable Searchable Symmetric Encryption (DVSSE) scheme, a client Alice can perform keyword-based searches on ciphertexts, and update (modify, delete and add) documents in a verifiable way. However, the DVSSE scheme is not suitable for the multi-user environment, where Alice may authorize many users to update documents. The reason is that it is hard to achieve traceability based on...
Personal Health Record (PHR) systems have been widely used to manage individuals' medical history. Meanwhile, with a rapid growth of the volume of PHRs, individuals outsource PHR systems to the cloud to facilitate management. In this paper, we consider a multi-source cloud-based PHR environment, where hospitals as the data providers are authorized to upload an individual's medical data to the cloud...
With the advent of cloud computing, it becomes increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve these data. For privacy concerns, secure searches over encrypted cloud data motivated several researches under the single owner model. However, most cloud servers in practice do not just serve one owner, instead, they support multiple...
Two-tiered wireless sensor networks offer good scalability, efficient power usage, and space saving. However, storage nodes are more attractive to attackers than sensors because they store sensor collected data and processing sink issued queries. A compromised storage node not only reveals sensor collected data, but also may reply incomplete or wrong query results. In this paper, we propose QuerySec,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.