The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
new notion called statistics privacy, i.e., the property that predicate privacy is preserved even when the statistical distribution of keywords is known. The second scheme we proposed makes a tradeoff between statistics privacy and storage efficiency (of the delegate). Compared to PEKS, both schemes introduce reasonable
documents related to a special keyword. Searchable encryption is a tool for data owners to encrypt their data in a searchable manner. Generally, there exist two kinds of searchable encryption, namely symmetric (secret key) and asymmetric (public key) ones. Most of the public key searchable encryption schemes are vulnerable to
Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation. Also the volume...
consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server
Querying over encrypted data is gaining increasing popularity in cloud based data hosting services. Security and efficiency are recognized as two important and yet conflicting requirements for querying over encrypted data. In this paper we propose an efficient public-key encryption with keyword search scheme (EPEKS
Search with privacy-preserving guarantee has been a critical issue for commercial cloud storage. Data owners outsource a large number of encrypted sensitive data to cloud and allow data users to search and retrieve encrypted data in cloud. Recently, Cao et al. [1] proposed a scheme to enable multi-keyword ranked
Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with
systems to find keywords that match the submitted queries approximately. Our work focuses on constructing a flexible secure index that allows the cloud server to perform the approximate search operations without revealing the content of the query trapdoor or the index content. Specifically, the most recently cryptographic
Since it is necessary to store data on different storage devices so to have privacy and security. It is desirable to encrypt the data before storing them. Since data is stored in a third party storage device in encrypted form it is very difficult to search data in its encrypted form. Thus making the retrieval process is difficult in large scale databases. In this paper we study and compare different...
Enterprises outsourcing their data to cloud and authorizing multiple users to access represents a typical application of cloud storage services. Searchable encryption is a cryptographic primitive, which allows users to access their data selectively and ensures the confidentiality of user data and keywords being
Broadcast Searchable Keywords Encryption (BSKE) is a novel scheme that allows searching in encrypted data without knowing a secret key. Consider Bob wants to encrypt the same data under master public key for a group of users and stores this encrypted data with Alice, Malice is one of those recipients he asks Alice
Cloud computing has garnered much interest in recent years for its many advantages, but also for its security, privacy concerns. The storage, access of confidential documents has been identified as one of the central problems in the area. Many researchers investigated solutions to search over encrypted documents stored on remote cloud servers. Others proposed schemes for ensuring data integrity or...
encrypted data. However, the majority of these approaches are limited to handle either a single keyword search or a Boolean search but not a multikeyword ranked search, a more efficient model to retrieve the top documents corresponding to the provided keywords. In this paper, we propose a secure multi-keyword ranked search
preserve the functionality, we observe that a protocol of integration with searchable encryption and keyword search via distributed hash table allows the nodes in a network to search over encrypted and distributed data. However, this protocol does not address a practical threat in a fully distributed scenario. Malicious nodes
isowned by multi persons. In this approach, we haveproposed a new scheme to deal with preserving the privacyin encrypted cloud data using multi-keyword searching. Toenable cloud server to perform access securely to searchingthe data with no cognizance about the real data of bothkeywords and trapdoors.
large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results
over a data owner's outsourced encrypted data? How can the data users be assured that the cloud faithfully executed the search operations on their behalf? Motivated by these questions, we propose a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS). The solution allows a data user
technology to provide a secure distributed data storage with keyword search service. The system allows the client to upload their data in encrypted form, distributes the data content to cloud nodes and ensures data availability using cryptographic techniques. It also provides the data owner a capability to grant permission for
Yu et al. proposed a two-round multi-keyword ciphertext retrieval TRMCR) scheme by employing a vector space model and homomorphic encryption. A distinctive feature is to support top-k multi-keyword retrieval and hence TRMCR is an excellent choice for searching encrypted data over cloud with a desirable property of
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.