The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Performing smart computations in a context of cloud computing and big data is highly appreciated today. Fully homomorphic encryption (FHE) is a smart category of encryption schemes that allows working with the data in its encrypted form. It permits us to preserve confidentiality of our sensible data and to benefit from cloud computing powers. Currently, it has been demonstrated by many existing schemes...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth. We introduce a new client-side deduplication protocol, called DICE (Dual Integrity Convergent...
Cloud computing is becoming a widely adopted technology for delivering On-Demand IT Services via Internet. Despite the rapid advancement of cloud-based environments, security challenges have to be addressed to a greater extent. One of the major issues in modern clouds is to guarantee the privacy and security of resources after the process of user revocation. In fact, each of revocation requests should...
Cloud computing is a technology that facilitates numerous configurable resources in which the data is stored and managed in a decentralized manner. However, since the data is out of the owner's control, concerns have arisen regarding data confidentiality. Encryption techniques have previously been proposed to provide users with confidentiality in terms of outsource storage; however, many of these...
The advancements made in cloud applications attracts the healthcare society. The analysis over Electronic Health Record (EHR) gains much importance among the research communities. As EHR contains sensitive information, the need of security and privacy is to be analyzed effectively. The services like outsourcing and increased computation has enhanced the usage of the digital technologies. The digital...
Due to its flexibility and efficiency, cloud computing becomes a typical infrastructure for storing, processing, and sharing a large amount of Internet of Things (IoT) data collected from devices and sensors. However, data sent to the Cloud may be used incorrectly or copied without permission. To allow owner of data sent to the Cloud to grant access to a specific set of captured data fields for a...
Security has always been concern when it comes to data sharing in cloud computing. Cloud computing provides high computation power and memory. Cloud computing is convenient way for data sharing. But users may sometime needs to outsourced the shared data to cloud server though it contains valuable and sensitive information. Thus it is necessary to provide cryptographically enhanced access control for...
Cloud computing has acted both like a boon as well as a bane. The amount of flexibility it provides and the costing adds to the positive side. Compromise in terms of security is one of the flaws that proves to be a big threat for the user. We here try to rectify this flaw by proposing a system which provides both encryption as well as an access control system for the users. In the paper we first introduce...
Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms such as revoked user-based or manual re-encryption...
Smartphones and other mobile platforms provide a low cost and easily accessible method of monitoring patient health, and aid healthcare professionals in early detection of disease. Immediate access to the gathered data is an essential factor in effective patient care. But the current processes used for patients' vital data collection is slow and error prone. This undermines the advantages of remote...
With the Extension and application of cloud computing, users are more inclined to store data in the cloud. Hence the user data privacy protection have become important issues to be solved urgently. Encryption is an effective way to protect privacy, but encryption has a great impact on the performance of data processing. Encrypted data are often lost maneuverability. To cope with this problem, in this...
Internet ofThings (IoT) is flourishing and has penetrated deeply into people’s daily life. With the seamless connection to the physical world, IoT provides tremendous opportunities to a wide range of applications. However, potential risks exist when the IoT system collects sensor data and uploads it to the cloud.The leakage of private data can be severe with curious database administrator or malicious...
In this invited paper, we propose HealthShare - a forward-looking approach for secure ehealth data sharing between multiple organizations that are hosting patients data in different clouds. The proposed protocol is based on a Revocable Key-Policy Attribute-Based Encryption scheme and allows users to share encrypted health records based on a policy that has been defined by the data owner (i.e. patient,...
Searchable Symmetric Encryption (SSE) allows users to execute encrypted queries over encrypted databases. A large number of SSE schemes have been proposed in the literature. However, most of them leak a significant amount of information that could lead to inference attacks. In this work, we propose an SSE scheme for a Privacy-preserving Multi-cloud encrypted Database (P-McDb), which aims at preventing...
From the perspective of services to the population, with vast social implications, in which the security, confidentiality, and access to personal data represents a critical region, the medical services and information systems that are on the base of the strategic management in health care systems, are a theme of maximum interest and rather less approached. In particular, the prospect of at-home health...
Protection of data in cloud computing is a critical problem for many enterprises. We propose a solution that protects sensitive data outsourced to a cloud throughout their entire life cycle—both in the cloud as well as outside of the cloud (e.g., during transmission to or from the cloud). Our solution, known as Active Data Bundles using Secure Multi-Party Computation (ADB-SMC), uses: (i) active data...
Storing data in the cloud is often a long and disputed process of ensuring that cloud service providers meet the clients minimum requirements. Often, this process can be costly, lack adequate results, and miss important security checks that are often overlooked. Therefore, I propose a new strategy for meeting cloud security requirements through using a dynamic parsing agent to encrypt outgoing data...
Attribute-Based Encryption Scheme solves the security problems faced by cloud storage. In many practical applications, the files encrypted by Attribute-Based Encryption have the characteristics of multiple levels. However, CP-ABE cannot encrypt the data according to the level. This paper proposes a hierarchy attribute-based encryption algorithm to support the direct revocation. First, the encryption...
The emergence of MapReduce, a simple software framework, is helping to deal with vast amount of data (multiterabyte data-sets) in-parallel on large clusters (thousands of nodes) of commodity hardware in a reliable, fault-tolerant manner. Extensive researches and popularity are gained by MapReduce recently. In this paper, we consider the MapReduce task scheduling problem with security and outage constraints,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.