The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IT industry is booming. So, the requirement for resources is also on the increase. Industry requires more processing power and storage capability to meet their goal. Here, Cloud Computing comes in the picture, it provides IT industry the much-needed resources on a large scale at low cost and makes their task easy. Organizations can easily outsource their huge amount of data to cloud storage. However,...
This work adopts the paradigm of cloud computing over the framework of Device-to-Device (D2D) communications in LTE-Advanced to enable mobile devices to offer network services to nearby devices, thus acting as mobile cloudlets, and to offload cellular traffic from the core network. Hence, any mobile device seeking a new service can search and discover for nearby services with the help of the LTE-A...
documents related to a special keyword. Searchable encryption is a tool for data owners to encrypt their data in a searchable manner. Generally, there exist two kinds of searchable encryption, namely symmetric (secret key) and asymmetric (public key) ones. Most of the public key searchable encryption schemes are vulnerable to
of services to various clients by not considering different clients requirements and therefore not able to fulfill clients actualize needs. For this method, we introduce a Positive Negative Keyword-Aware Service Recommendation strategy, abbreviated PNKASR, to minimize the raised difficulties and for accuracy point of
consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server
Search with privacy-preserving guarantee has been a critical issue for commercial cloud storage. Data owners outsource a large number of encrypted sensitive data to cloud and allow data users to search and retrieve encrypted data in cloud. Recently, Cao et al. [1] proposed a scheme to enable multi-keyword ranked
Enterprises outsourcing their data to cloud and authorizing multiple users to access represents a typical application of cloud storage services. Searchable encryption is a cryptographic primitive, which allows users to access their data selectively and ensures the confidentiality of user data and keywords being
Cloud computing has garnered much interest in recent years for its many advantages, but also for its security, privacy concerns. The storage, access of confidential documents has been identified as one of the central problems in the area. Many researchers investigated solutions to search over encrypted documents stored on remote cloud servers. Others proposed schemes for ensuring data integrity or...
encrypted data. However, the majority of these approaches are limited to handle either a single keyword search or a Boolean search but not a multikeyword ranked search, a more efficient model to retrieve the top documents corresponding to the provided keywords. In this paper, we propose a secure multi-keyword ranked search
isowned by multi persons. In this approach, we haveproposed a new scheme to deal with preserving the privacyin encrypted cloud data using multi-keyword searching. Toenable cloud server to perform access securely to searchingthe data with no cognizance about the real data of bothkeywords and trapdoors.
privacy-preserving. As the volume of data is increasing at a dramatic rate, it is essential to develop an efficient and reliable ciphertext search techniques, so that data owners can easily access and update cloud data. In this paper, we propose a privacy preserving multi-keyword ranked search scheme over encrypted data in
large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results
for private keyword based search over the encrypted database. The above setting of enterprise outsourcing database to the cloud requires multi-user searchable encryption, whereas virtually all existing schemes consider the single-user setting. To bridge this gap, we are motivated to propose a practical multi-user
Yu et al. proposed a two-round multi-keyword ciphertext retrieval TRMCR) scheme by employing a vector space model and homomorphic encryption. A distinctive feature is to support top-k multi-keyword retrieval and hence TRMCR is an excellent choice for searching encrypted data over cloud with a desirable property of
the area of secure searching in the outsourcing scenario usually incur high computational complexity, which makes the approach impractical. In this paper, we take one step ahead by proposing an efficient keyword search scheme for cloud computing. Our solution is very lightweight, and it enables efficient multi-user
advertised policies. In this paper, we focus in particular on the scenario where a data owner wishes to (i) outsource its public database to a cloud server; (ii) enable anyone to submit multi-keyword search queries to the outsourced database; and (iii) ensure that anyone can verify the correctness of the server's responses. To
cloud server. In this paper, using on line Personal Health Record (PHR) as a case study, we first show the necessity of search capability authorization that reduces the privacy exposure resulting from the search results, and establish a scalable framework for Authorized Private Keyword Search (APKS) over encrypted cloud
capabilities to the data users? To solve these problems, we propose two attribute-based keyword search and data access control schemes based on public-key searchable encryption and attribute based encryption. Our solutions allow a data owner to control the access policy and grant the search policy to any data user who wants to
Recently, secure search over encrypted cloud data has become a hot research spot and challenging task. Some secure search schemes have been proposed to try to meet this challenge. In this paper, we propose a conjunctive multi-keyword secure search scheme for multiple data owners. To guarantee data security and system
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.