Thursday, 12 January 2017

IEEE 2016: An Efficient Privacy-Preserving Ranked Keyword Search Method


IEEE 2016 Transaction on Cloud Computing
Abstract:Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation. Also the volume of data in data centers has experienced a dramatic growth. This will make it even more challenging to design ciphertext search schemes that can provide efficient and reliable online information retrieval on large volume of encrypted data. In this paper, a hierarchical clustering method is proposed to support more search semantics and also to meet the demand for fast ciphertext search within a big data environment. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold, and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this approach can reach a linear computational complexity against an exponential size increase of document collection. In order to verify the authenticity of search results, a structure called minimum hash sub-tree is designed in this paper. Experiments have been conducted using the collection set built from the IEEE Xplore. The results show that with a sharp increase of documents in the dataset the search time of the proposed method increases linearly whereas the search time of the traditional method increases exponentially. Furthermore, the proposed method has an advantage over the traditional method in the rank privacy and relevance of retrieved documents.



IEEE 2016: Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage

IEEE 2016 Transaction on Cloud Computing
Abstract:Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this work, we investigate the security of a well-known cryptographic primitive, namely Public Key Encryption with Keyword Search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside Keyword Guessing Attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named Dual-Server Public Key Encryption with Keyword Search (DS-PEKS). As another main contribution, we define a new variant of the Smooth Projective Hash Functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a DDH-based LH-SPHF and show that it can achieve the strong security against inside KGA.



IEEE 2016:  SecRBAC: Secure data in the Clouds

IEEE 2016 Transaction on Cloud Computing
Abstract:Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of control over their data and raises reasonable security concerns that slow down the adoption of Cloud computing. Is the Cloud service provider accessing the data? Is it legitimately applying the access control policy defined by the user? This paper presents a data-centric access control solution with enriched role-based expressiveness in which security is focused on protecting user data regardless the Cloud service provider that holds it. Novel identity-based and proxy re-encryption techniques are used to protect the authorization model. Data is encrypted and authorization rules are cryptographically protected to preserve user data against the service provider access or misbehavior. The authorization model provides high expressiveness with role hierarchy and resource hierarchy support. The solution takes advantage of the logic formalism provided by Semantic Web technologies, which enables advanced rule management like semantic conflict detection. A proof of concept implementation has been developed and a working prototypical deployment of the proposal has been integrated within Google services.

16 comments:

  1. Bluehost is ultimately the best hosting company with plans for any hosting needs.

    ReplyDelete
  2. Thanks for sharing the valuable information here. So i think i got some useful information with this content. Thank you and please keep update like this informative details.

    SEO Company in India

    ReplyDelete
  3. Your blog is very informative and gracefully. Your guideline is very good. Thank you IEEE Projects | IEEE Projects For ISE

    ReplyDelete
  4. Thank you for sharing such a informative information with us. Keep on sharing the blog like this.

    PhD Thesis Writing Services, Dissertation Writing Services & Research Paper Writing Services

    ReplyDelete
  5. Such a great articles in my carrier, It's wonderful commands like easiest understand words of knowledge in information's.
    Sat Coaching Chennai

    ReplyDelete
  6. ASK2projects provides best final year IEEE projects for Engineering/Diploma students particularly for EEE, E&I, ECE department students. We are the best IEEE Projects Center in Chennai
    IEEE Projects in Chennai
    IEEE Projects Center in Chennai

    ReplyDelete
  7. Great post! I am see the programming coding and step by step execute the outputs.I am gather this coding more information. It's helpful for me my friend. Also great blog here with all of the valuable information you have.

    Fresher Jobs in Chennai
    Fresher Jobs in Delhi
    Fresher Jobs in Bangalore
    Fresher Jobs in Kolkata

    ReplyDelete
  8. This is an awesome post.Really very informative and creative contents. These concept is a good way to enhance the knowledge.I like it and help me to development very well.Thank you for this brief explanation and very nice information.Well, got a good knowledge.
    Fresher Jobs
    Fresher Openings

    ReplyDelete
  9. Just found your post by searching on the Google, I am Impressed and Learned Lot of new thing from your post. I am new to blogging and always try to learn new skill as I believe that blogging is the full time job for learning new things day by day.
    "Emergers Technologies"

    ReplyDelete
  10. Very nice post here thanks for it I always like and search such topics and everything connected to them. Keep update more information..
    Digital Marketing Company in Chennai

    ReplyDelete
  11. Simply amazing blog and the way you present it is quite innovative and I wish to read more stuff of yours in the coming times so please do share more and more.
    Latest Trends in Art

    ReplyDelete
  12. Creative content writing at his best and you have just shown us the best possible way of how you can portrait your work or thoughts in front of the audience in a quite innovative and informative manner so thank you for doing this and hoping that you may share more interesting stuff like this in the future also.
    Textile Industry Analysis

    ReplyDelete
  13. Nice blog! Thanks for sharing.I m always looking for new. Plz post more.
    I am trying to follow your post.

    บาคาร่าออนไลน์
    โกลเด้นสล็อต
    gclub

    ReplyDelete

  14. Its a wonderful post and very helpful, thanks for all this information. You are including better information regarding this topic in an effective way.Thank you so much

    Personal Installment Loans
    Payday Cash Advance loan
    Title Car loan
    Cash Advance Loan

    ReplyDelete
  15. Nitro's Projects - If you are looking for work in It and computer sector then contact Nitro. It is a leading IT company for computer course and work provider in the world.

    ReplyDelete