Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Confidential data should be encrypted in out-souring services in cloud computing environment in order to minimise the risk of data revealing. There have been many schemes, classified as searchable encryption, which provides capabilities to securely search over encrypted data through keywords without decryption key. In
large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results
. Here we consider that a large number of data users and document files in cloud and there must be a search service that allows multiple keyword queries and generates ranked results of retrieved files. In this paper, we propose a multi-keyword search scheme that not only enable document keyword search but also supports
is very different from the retrieval of plaintext. The traditional plaintext retrieval method is no longer suitable for the retrieval of the cipher text. In the previous fuzzy search strategy, although fuzzy keyword sets that building on keyword dictionary can realize the fuzzy search. But when the keyword set is
Using cloud-based storage service, users can remotely store their data to clouds but also enjoy the high quality data retrieval services, without the tedious and cumbersome local data storage and maintenance. However, the sole storage service cannot satisfy all desirable requirements of users. Over the last decade, privacy-preserving search over encrypted cloud data has been a meaningful and practical...
In this paper, we address the problem of privacy preserving delegated word search in the cloud. We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users. In the face of semi-honest cloud servers, the data owner does not want to disclose any information about the outsourced data; yet it still wants to benefit...
In this paper, we consider the problem of securing mobile-cloud storage services. We design and develop a novel and secure searchable encryption scheme for mobile devices. In the proposed algorithm, a content based index is constructed and a locality sensitive hashing is used to allow the user to store his files on the cloud in a secure way and then perform a secure query and a fuzzy search. Moreover,...
Cloud Computing enables various users on the way to send their facts over cloud as well as also in distrusted manner. But during the transmission of data over distributed network in cloud, energy consumption is more and hence network becomes unstable and costly. Hence various techniques are implemented for the energy consumption in cloud network, but the technique implemented so far is not an efficient...
properties, few meet high performance requirements and most only support searching for a single keyword at a time. The SSE scheme of Cash et al. (CRYPTO 2013) is notable for its high efficiency on restricted forms of Boolean queries, but has low efficiency for, or does not support, other common forms of boolean queries. In this
orchestrates the user data into sets of keywords which are again encrypted. We further provide an unique measurement technique to identify unfaithful execution of user requested services by the cloud service provider. Our experiments demonstrate the practical applicability of such a sophisticated system. Though we logically
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.