scispace - formally typeset
Open AccessJournal ArticleDOI

Towards Differential Query Services in Cost-Efficient Clouds

TLDR
This paper presents three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud.
Abstract
Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we address two fundamental issues in such an environment: privacy and efficiency. We first review a private keyword-based file retrieval scheme that was originally proposed by Ostrovsky. Their scheme allows a user to retrieve files of interest from an untrusted server without leaking any information. The main drawback is that it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when there are a large number of matched files, but the user only needs a small subset of them. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cost Efficient Query Services throughAggregation and Distribution Layer

TL;DR: An Efficient Information Retrieval for Ranked Queries (EIRQ) scheme is recovery of ranked files on user demand by working based on the Aggregation and Distribution Layer (ADL).
Journal Article

Ranked Query Assistance in Untrusted Cloud Helper without Reveal Sensitive Data

TL;DR: Utilizing outsourced accommodations, the data owner can reduce the cost of storing data in cloud infrastructure, and provide reliable, customized, and ensured computing dynamic environment for end users.
Proceedings ArticleDOI

Personalized Search with Secure Updates in Educational Resources

TL;DR: A Personalized Search with Secure Updates (PSSU) in educational resources is proposed, able to obtain large educational resources data from resources contributed by the general public by the introduction of Trusted Third-Party (TTP) server, and evaluate the resources by analyzing the user's usage, then the users can obtain high-quality resources that meet their own needs.

Privacy and Secured Multiparty Data Categorization using Cloud Resources

TL;DR: Back-Propagation Neural network (BPN) is an effective method for learning neural networks that combines Boneh, Goh and Nissim doubly homomorphic encryption algorithm with random sharing algorithm to protect the intermediate data during the learning process.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Journal ArticleDOI

Energy-Efficient Cloud Computing

TL;DR: The usage of methods and technologies currently used for energy-efficient operation of computer hardware and network infrastructure and some of the remaining key research challenges that arise when such energy-saving techniques are extended for use in cloud computing environments are identified.
Related Papers (5)