The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's world usage of location based services on mobile devices such as smartphones, tablet PCs and laptops has become progressively popular. Even though location based services are proved to be very useful and convenient, they may cause risk to the users' location privacy, because for the retrieval of useful information based on user's location, user has to send his/her present location and the...
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we tackle such privacy concerns in the index coding framework. We show how a curious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy...
We consider the problem of designing PIR scheme on coded data when certain nodes are unresponsive. We provide the construction of ν-robust PIR schemes that can tolerate up to ν unresponsive nodes. These schemes are adaptive and universally optimal in the sense of achieving (asymptotically) optimal download cost for any number of unresponsive nodes up to ν.
A (K, N, T, Kc) instance of the MDS-TPIR problem is comprised of K messages and N distributed servers. Each message is separately encoded through an (N, Kc) MDS storage code. A user wishes to retrieve one message, as efficiently as possible, while revealing no information about the desired message index to any colluding set of up to T servers. The fundamental limit on the efficiency of retrieval,...
As a major branch of LBSs, geosocial networking services become popular. An important functionality of geosocial networking services is allowing people to find potential friends who have similar profile within close proximity and initiate communication with each other. However, in order to realize this functionality, most existing services require mobile users to reveal their profiles and location...
With the increasing prevalence of cloud computing, data owners prefer to outsource their databases to the cloud. For the protection of data privacy, sensitive data have to be encrypted before outsourcing, which introduces much difficulty into effective data utilization. Most previous studies either suffer from privacy disclosure and low efficiency, or do not support personalized multidimensional range...
In cloud infrastructure, garage of files is rapidly gaining popularity throughout the world. If an individual's sensitive information is stored in a remote storage location without encryption, an attacker can access these data without consent of data owner. This study addresses this trouble through offering a secured, effective & faster statistics data search in cloud through RSBS and trapdoors...
This paper presents a strategy for enabling speech recognition to be performed in the cloud whilst preserving the privacy of users. The approach advocates a demarcation of responsibilities between the client and server-side components for performing the speech recognition task. On the client-side resides the acoustic model, which symbolically encodes the audio and encrypts the data before uploading...
Yu et al. proposed a two-round multi-keyword ciphertext retrieval TRMCR) scheme by employing a vector space model and homomorphic encryption. A distinctive feature is to support top-k multi-keyword retrieval and hence TRMCR is an excellent choice for searching encrypted data over cloud with a desirable property of data privacy-preserving. Correct decryption is one of the fundamental requirements for...
With massive networks emerging with labels or textual contents on the nodes, keyword search on graphs has been used in a wide range of real-life applications in recent years. For achieving great cost savings, data owners are motivated to outsource their services on graphs to the cloud. However, directly outsourcing them may arise serious privacy concerns. In this paper, we study the problem of privacy-preserving...
In this paper, we address the problem of privacy preserving delegated word search in the cloud. We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users. In the face of semi-honest cloud servers, the data owner does not want to disclose any information about the outsourced data; yet it still wants to benefit...
Despite the promise of scalability, efficiency, low cost, the rapid adoption of cloud computing also raises many concerns. In particular, security, privacy has been at the forefront of discussions, research in recent years. In this paper, we consider the unexplored problem of malware detection on encrypted cloud storage, especially relevant when cloud storage facilities are used for data archiving,...
Cloud computing has garnered much interest in recent years for its many advantages, but also for its security, privacy concerns. The storage, access of confidential documents has been identified as one of the central problems in the area. Many researchers investigated solutions to search over encrypted documents stored on remote cloud servers. Others proposed schemes for ensuring data integrity or...
To preserve privacy, sensitive data in cloud computing needs to be encrypted before outsourcing, which obstacles data utilization based on plaintext search. Thus there spring up several secure schemes which enable encrypted cloud-data search. However, these single-cloud-supported search schemes would suffer from service failure, inefficient application, and privacy problem when they are applied to...
In a Dynamic Verifiable Searchable Symmetric Encryption (DVSSE) scheme, a client Alice can perform keyword-based searches on ciphertexts, and update (modify, delete and add) documents in a verifiable way. However, the DVSSE scheme is not suitable for the multi-user environment, where Alice may authorize many users to update documents. The reason is that it is hard to achieve traceability based on...
Nowadays, Cloud storage helps the users to remotely store and access the data. Any modification or corruption in data by unauthorized users will lead to insecure cloud framework. Protecting the users data from unauthorized access or malicious attacks in cloud is one of the major research direction to address the issues of data privacy and integrity in cloud. Ensuring cloud data integrity and privacy...
In this paper, we investigate Private Set Intersection (PSI) schemes that can be used to output intersection data between a client and a server in a way that only the client learns the output at the end of their joint computation. Recently, Dong et al. proposed a Bloom filter-based PSI scheme for big data. We show that a malicious client is able to learn not only the intersection but other part of...
Despite the many benefits of cloud technologies, there have also been significant concerns regarding its security and privacy. To address the issues, much efforts have been made towards development of an encrypted cloud system. One of the key features being investigated is the ability to search over encrypted data. Although many have proposed solutions for conjunctive keyword search, few have considered...
Querying over encrypted data is gaining increasing popularity in cloud based data hosting services. Security and efficiency are recognized as two important and yet conflicting requirements for querying over encrypted data. In this paper we propose an efficient public-key encryption with keyword search scheme (EPEKS for short) that support binary search for inverted index-based encrypted data. First,...
Dynamic searchable encryption enables data owner to store a dynamic collection of encrypted files to the cloud server and generate search tokens of queries over the cloud server. Upon receiving a token, the server can perform the search on the \encrypted data while preserving privacy. Unlike many previous works that focused on a single-user scheme, we present a dynamic searchable encryption scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.