The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
patterns. However, this implies an expensive computation or communication cost of all the data on the server. Existing solutions are not efficient due to their impractical communication and computation cost. Besides, most of them do not support keyword search. In this paper, we introduce the mechanism of pricing to solve the
present a new approach to constructing efficient oblivious keyword search (OKS) protocol, which permits fast search (i.e., sub-linear time) and relatively short ciphertext, while providing provably strong privacy for both users and cloud storage service providers. Previous OKS protocols have ciphertext size linear in the
Cloud computing has emerged as a major way of reducing the information technology costs incurred by organizations. For a cost-sensitive organization which stores its data in the cloud and retrieves files via keyword search, the primary focus is on the issues of cost effectiveness as well as privacy. Three keyword
potential security breaches, using techniques ranging from simple keyword matching to more advanced machine learning and data mining analysis. But this creates a problem: how can middleboxes, which employ DPI, work over HTTPS connections with encrypted traffic while preserving privacy? In this paper, we present SPABox, a
-efficiency and privacy. Three secure search protocols, namely Ostrovsky protocol, COPS protocol and EIRQ protocol are discussed in this paper. Each of these protocols incrementally improves upon the basic keyword search. Ostrovsky protocol offers privacy. COPS protocol aggregates the search results and achieves cost efficiency
would allow the OSN provider to perform keyword search over the encrypted content for advertising profit, so that the OSN provider can commercialize its products without the knowledge of content.
Polynomial evaluation is an important tool in constructing many cryptographic protocols, such as proof of retrievability and verifiable keyword search. However, for the high degree polynomials derived from very large datasets, polynomial evaluation becomes an intractable problem, especially for resource limited
Cloud computing has provided a global infrastructure for knowledge-intensive service functions. A keyword-based search engine such as Google has remarkable capabilities for knowledge-intensive service functions. But from the view point of privacy preserving, they are far from being sufficient. The privacy preserving
In this paper, we describe a new primitive for error-tolerant searchable encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close
Smart grid is an emerging technology because of its attractive features, such as distributed energy control and robust load fluctuation management. Demand Response (DR) system is an important component of smart grid as it can help maintaining demand-supply balance and controlling electricity bills at the user end. One of the visions of smart grid technology is communication between consumers and suppliers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.