The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
keyword in plaintext, which may leak privacy of users in cloud storage environment. In this paper we propose an efficient privacy preserving keyword search scheme in cloud storage, the scheme satisfies the multi-user requirement with low computational overhead and flexible key management., and it is proved to be secure and
cloud, the more privacy and information security risks will be. This paper presents a data retrieval system by using public key encryption system with keyword search, in which the client could test whether or not the file stored in cloud server contains the keyword without leaking the information about the encrypted file
authorized ones. In this paper, we propose a novel searchable encryption scheme, named PEKS-PM, based on pseudo inverse matrix, which enables a trusted party to give the service provider's server the ability to test whether a given keyword appears in log records but the server learns nothing about the keyword and the log
Cloud Computing enables various users on the way to send their facts over cloud as well as also in distrusted manner. But during the transmission of data over distributed network in cloud, energy consumption is more and hence network becomes unstable and costly. Hence various techniques are implemented for the energy consumption in cloud network, but the technique implemented so far is not an efficient...
We collected 79,012 articles from 1916–2016 related to big data to determine which topics were being studied and how much of the literature was focused on privacy or security-related keywords. The analysis demonstrated that the big data paradigm commenced in late 2011 and the research production exponentially
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.