The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1016/j.future.2016.03.013
|View full text |Cite
|
Sign up to set email alerts
|

Secure searching on cloud storage enhanced by homomorphic indexing

Abstract: h i g h l i g h t s • A searchable encryption is presented against both data and access pattern leakage. • A homomorphic exclusive-or (XOR) function is defined to enable the evaluation key to be calculated instead of storing. • An effective and feasible approach performs with a query of less than 60 milliseconds among 100,000 entries.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…The Exclusive-Or homomorphic encryption technique is discussed in this paper and also provide the information on the secure data upload and secure data searching [1]. In past years, the data owners' information can be leaked to the outsider and cloud service provider through passive attacker.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The Exclusive-Or homomorphic encryption technique is discussed in this paper and also provide the information on the secure data upload and secure data searching [1]. In past years, the data owners' information can be leaked to the outsider and cloud service provider through passive attacker.…”
Section: Related Workmentioning
confidence: 99%
“…Exclusive-or (XOR) homomorphism encryption scheme with Multi-keyword ranked search can be implemented to resolve the outsourcing data to the cloud. XOR Homomorphic encryption searchable [1] algorithm is presented to protect the data privacy from unwanted access in cloud environment. The main mechanism involved in scheme [3] is first; this technique gives protection of data by pre-encrypting the single or multiple keywords and performing randomization over the XOR operation in bitwise and secure data leak on pattern which can be accessed frequently.…”
Section: Introductionmentioning
confidence: 99%
“…Basics of ''Ranking'' is precisely explained by [14,31] On the contrary, most cloud servers in cutting-edge practice not only serve one owner; instead, they support multiple owners to segment the profits brought by cloud computing. Thus, we classify several Logic is expressive and flexible enough to represent many existing privacy criteria, such as kanonymity, logical safety, l-diversity, t-closeness, and §-disclosure…”
Section: Ranking-oriented Privacy Measuresmentioning
confidence: 99%
“…With the explosive use of computer networks, a number of security issues on the Internet and in computer systems have been raised. Hence, the security of Internet-connected devices from various threats has become considerably important to ensure system availability and integrity [1]. Based on the annual report of 2016 from Asia Pacific Computer Emergency Response Team (CERT) showed a tremendous increment in the amount of intrusions and cyber-attacks over the decade [2].…”
Section: Introductionmentioning
confidence: 99%