Sciweavers

12 search results - page 2 / 3
» Secure Ranked Keyword Search over Encrypted Cloud Data
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 3 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
GRC
2007
IEEE
13 years 11 months ago
Secure Similarity Search
— One of the most substantial ways to protect users’ sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has bee...
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn ...
PET
2012
Springer
11 years 7 months ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...
ICIP
2010
IEEE
13 years 2 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
DBSEC
2008
196views Database» more  DBSEC 2008»
13 years 6 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay