scispace - formally typeset
Open AccessJournal ArticleDOI

Towards Differential Query Services in Cost-Efficient Clouds

TLDR
This paper presents three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud.
Abstract: 
Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we address two fundamental issues in such an environment: privacy and efficiency. We first review a private keyword-based file retrieval scheme that was originally proposed by Ostrovsky. Their scheme allows a user to retrieve files of interest from an untrusted server without leaking any information. The main drawback is that it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when there are a large number of matched files, but the user only needs a small subset of them. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Privacy ensured healthcare data analysis under clouds

TL;DR: Privacy preserved BPN learning process is tuned with cloud resource allocation process, and secure scalar Product and addition protocols are adapted to protect the intermediate data values.
Proceedings ArticleDOI

Weighted Ranked Queries for secure search in cost-effective clouds

TL;DR: Three keyword-based secure search protocols, namely Ostrovsky protocol, Cooperative Private Searching (COPS) protocol and Efficient Information Retrieval for Ranked Queries (EIRQ) protocol are reviewed and a new protocol named WRQ is proposed.
Proceedings ArticleDOI

Multi-sensor Multi-Bernoulli target tracking algorithm based on measurement fusion

TL;DR: In this paper, a greedy measurement fusion partitioning mechanism based on the multi-Bernoulli filter (MeMBer) is proposed to solve the problem of multi-target tracking.
Journal ArticleDOI

Searchable Encryption Taxonomy: Survey

TL;DR: In this paper , a classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used is presented.
Journal Article

Attribute Based De-Duplication Method

TL;DR: Developed framework will provide attribute based deduplication on heterogeneous contents of cloud contents to optimize storage with reliability and accuracy along with reducing computation overhead and recoverability.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI

Searchable symmetric encryption: improved definitions and efficient constructions

TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Journal ArticleDOI

Energy-Efficient Cloud Computing

TL;DR: The usage of methods and technologies currently used for energy-efficient operation of computer hardware and network infrastructure and some of the remaining key research challenges that arise when such energy-saving techniques are extended for use in cloud computing environments are identified.
Related Papers (5)