The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Confidential data should be encrypted in out-souring services in cloud computing environment in order to minimise the risk of data revealing. There have been many schemes, classified as searchable encryption, which provides capabilities to securely search over encrypted data through keywords without decryption key. In
large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results
. Here we consider that a large number of data users and document files in cloud and there must be a search service that allows multiple keyword queries and generates ranked results of retrieved files. In this paper, we propose a multi-keyword search scheme that not only enable document keyword search but also supports
is very different from the retrieval of plaintext. The traditional plaintext retrieval method is no longer suitable for the retrieval of the cipher text. In the previous fuzzy search strategy, although fuzzy keyword sets that building on keyword dictionary can realize the fuzzy search. But when the keyword set is
Using cloud-based storage service, users can remotely store their data to clouds but also enjoy the high quality data retrieval services, without the tedious and cumbersome local data storage and maintenance. However, the sole storage service cannot satisfy all desirable requirements of users. Over the last decade, privacy-preserving search over encrypted cloud data has been a meaningful and practical...
In this paper, we address the problem of privacy preserving delegated word search in the cloud. We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users. In the face of semi-honest cloud servers, the data owner does not want to disclose any information about the outsourced data; yet it still wants to benefit...
In this paper, we consider the problem of securing mobile-cloud storage services. We design and develop a novel and secure searchable encryption scheme for mobile devices. In the proposed algorithm, a content based index is constructed and a locality sensitive hashing is used to allow the user to store his files on the cloud in a secure way and then perform a secure query and a fuzzy search. Moreover,...
Cloud Computing enables various users on the way to send their facts over cloud as well as also in distrusted manner. But during the transmission of data over distributed network in cloud, energy consumption is more and hence network becomes unstable and costly. Hence various techniques are implemented for the energy consumption in cloud network, but the technique implemented so far is not an efficient...
properties, few meet high performance requirements and most only support searching for a single keyword at a time. The SSE scheme of Cash et al. (CRYPTO 2013) is notable for its high efficiency on restricted forms of Boolean queries, but has low efficiency for, or does not support, other common forms of boolean queries. In this
orchestrates the user data into sets of keywords which are again encrypted. We further provide an unique measurement technique to identify unfaithful execution of user requested services by the cloud service provider. Our experiments demonstrate the practical applicability of such a sophisticated system. Though we logically
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.