scispace - formally typeset
Open AccessJournal ArticleDOI

Towards Differential Query Services in Cost-Efficient Clouds

TLDR
This paper presents three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud.
Abstract
Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we address two fundamental issues in such an environment: privacy and efficiency. We first review a private keyword-based file retrieval scheme that was originally proposed by Ostrovsky. Their scheme allows a user to retrieve files of interest from an untrusted server without leaking any information. The main drawback is that it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when there are a large number of matched files, but the user only needs a small subset of them. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Regular Language Search over Encrypted Cloud Data Using Token Generation: A Review Paper

TL;DR: This paper proposes regular language search over encrypted data store on public cloud using DFA based token generation method, which is based on attributes like privacy, efficiency, accuracy and overhead.
Book ChapterDOI

Smart Search over Encrypted Educational Resources in Cloud Storage

TL;DR: In this article , a Smart Search over Encrypted Educational Resources (SSEER) in cloud storage was proposed, which introduced a trusted third party (TTP) server to obtain a large number of educational resources through crowdsourcing.
Journal Article

Retrieving the Data From Cloud Using Differential Query Services

TL;DR: This work presents a new scheme called EIRQ (Efficient Information Retrieval for Ranked Query), based on an ADL (Aggregation and Distribution Layer), to lessen the querying cost.
Journal ArticleDOI

Research on Selection Method of Privacy Parameter ε

TL;DR: This paper proposes a differential privacy protection parameter configuration method based on fault tolerance interval and analyzes the adversaryʼs fault tolerance under different noise distribution location parameters and scale parameters, and proposes an algorithm to optimize the application scenarios of multiquery.
Journal Article

Towards Difference Request Facilities in Cost-Efficient Clouds

TL;DR: An economical info Retrieval for hierarchical Queries (EIRQ) theme is recovery of hierarchical files on user demand to avoid tiny scale of interruptions in cloud computing.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Journal ArticleDOI

Energy-Efficient Cloud Computing

TL;DR: The usage of methods and technologies currently used for energy-efficient operation of computer hardware and network infrastructure and some of the remaining key research challenges that arise when such energy-saving techniques are extended for use in cloud computing environments are identified.
Related Papers (5)