Results 31 to 40 of about 2,018 (260)

HardIDX: Practical and Secure Index with SGX [PDF]

open access: yes, 2017
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva   +13 more
core   +4 more sources

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data [PDF]

open access: yes, 2016
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage.
Geeta Mara, .   +5 more
core   +1 more source

CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients

open access: yesJournal of King Saud University: Computer and Information Sciences
Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting
Ze Zhu, Wanshan Xu, Junfeng Xu
doaj   +1 more source

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

A Survey on Design and Implementation of Protected Searchable Data in the Cloud [PDF]

open access: yes, 2017
While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the storage and management of data and applications, a number of vulnerabilities that led to multiple attacks have ...
Dowsley, R.   +7 more
core   +1 more source

Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud

open access: yesIEEE Access, 2018
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang   +4 more
doaj   +1 more source

A parallelized disjunctive query based searchable encryption scheme for big data [PDF]

open access: yes, 2018
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive ...
Rajarajan, M.   +4 more
core   +1 more source

Confidentiality-Preserving Publish/Subscribe: A Survey

open access: yes, 2016
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains.
Felber, Pascal   +3 more
core   +1 more source

LocLess: Do You Really Care Where Your Cloud Files Are? [PDF]

open access: yes, 2016
Physical location of data in cloud storage is a problem that gains a lot of attention not only from the actual cloud providers but also from the end users' who lately raise many concerns regarding the privacy of their data.
Michalas, A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy