Towards Differential Query Services in Cost-Efficient Clouds
TLDR
This paper presents three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud.Abstract:Â
Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, we address two fundamental issues in such an environment: privacy and efficiency. We first review a private keyword-based file retrieval scheme that was originally proposed by Ostrovsky. Their scheme allows a user to retrieve files of interest from an untrusted server without leaking any information. The main drawback is that it will cause a heavy querying overhead incurred on the cloud and thus goes against the original intention of cost efficiency. In this paper, we present three efficient information retrieval for ranked query (EIRQ) schemes to reduce querying overhead incurred on the cloud. In EIRQ, queries are classified into multiple ranks, where a higher ranked query can retrieve a higher percentage of matched files. A user can retrieve files on demand by choosing queries of different ranks. This feature is useful when there are a large number of matched files, but the user only needs a small subset of them. Under different parameter settings, extensive evaluations have been conducted on both analytical models and on a real cloud environment, in order to examine the effectiveness of our schemes.read more
Citations
More filters
Journal Article
Privacy ensured healthcare data analysis under clouds
TL;DR: Privacy preserved BPN learning process is tuned with cloud resource allocation process, and secure scalar Product and addition protocols are adapted to protect the intermediate data values.
Proceedings ArticleDOI
Weighted Ranked Queries for secure search in cost-effective clouds
V. Anand,Ahmed Abdul Moiz Qyser +1 more
TL;DR: Three keyword-based secure search protocols, namely Ostrovsky protocol, Cooperative Private Searching (COPS) protocol and Efficient Information Retrieval for Ranked Queries (EIRQ) protocol are reviewed and a new protocol named WRQ is proposed.
Proceedings ArticleDOI
Multi-sensor Multi-Bernoulli target tracking algorithm based on measurement fusion
TL;DR: In this paper, a greedy measurement fusion partitioning mechanism based on the multi-Bernoulli filter (MeMBer) is proposed to solve the problem of multi-target tracking.
Journal ArticleDOI
Searchable Encryption Taxonomy: Survey
TL;DR: In this paper , a classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used is presented.
Journal Article
Attribute Based De-Duplication Method
Dinesh Mishra,Sanjeev Patwa +1 more
TL;DR: Developed framework will provide attribute based deduplication on heterogeneous contents of cloud contents to optimize storage with reliability and accuracy along with reducing computation overhead and recoverability.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI
Searchable symmetric encryption: improved definitions and efficient constructions
TL;DR: In this paper, the authors proposed a searchable symmetric encryption (SSE) scheme for the multi-user setting, where queries to the server can be chosen adaptively during the execution of the search.
Journal ArticleDOI
Energy-Efficient Cloud Computing
Andreas Berl,Erol Gelenbe,Marco Di Girolamo,Giovanni Giuliani,Hermann de Meer,Minh Quan Dang,Kostas Pentikousis +6 more
TL;DR: The usage of methods and technologies currently used for energy-efficient operation of computer hardware and network infrastructure and some of the remaining key research challenges that arise when such energy-saving techniques are extended for use in cloud computing environments are identified.