[go: up one dir, main page]

Raghavendra et al., 2016 - Google Patents

DRSIG: Domain and Range Specific Index Generation for Encrypted Cloud Data

Raghavendra et al., 2016

Document ID
14352938278113374394
Author
Raghavendra S
Mara G
Buyya R
Rajuk V
Iyengar S
Patnaik L
Publication year
Publication venue
2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT)

External Links

Snippet

One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage. The confidential data is encrypt before uploading to the cloud server in order to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30017Multimedia data retrieval; Retrieval of more than one type of audiovisual media
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
CN108062485A (en) A kind of fuzzy keyword searching method of multi-service oriented device multi-user
Pham et al. Survey on secure search over encrypted data on the cloud
CN110222081B (en) Data ciphertext query method based on fine-grained sequencing in multi-user environment
CN106934301A (en) A kind of safely outsourced data processing method of relevant database for supporting ciphertext data manipulation
Khan et al. Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data
Peng et al. LS-RQ: A lightweight and forward-secure range query on geographically encrypted data
Chamili et al. Searchable encryption: a review
Meharwade et al. Efficient keyword search over encrypted cloud data
Song et al. An efficient and privacy-preserving multi-user multi-keyword search scheme without key sharing
Lv et al. RASK: Range spatial keyword queries on massive encrypted geo-textual data
Park et al. PKIS: practical keyword index search on cloud datacenter
Sreekumari Privacy-preserving keyword search schemes over encrypted cloud data: an extensive analysis
CN114254344A (en) Private data range query method of shared database based on block chain
Raghavendra et al. DRSIG: Domain and Range Specific Index Generation for Encrypted Cloud Data
Handa et al. Efficient privacy‐preserving scheme supporting disjunctive multi‐keyword search with ranking
Raghavendra et al. DRSMS: Domain and range specific multi-keyword search over encrypted cloud data
Hahn et al. Efficient multi-user similarity search over encrypted data in cloud storage
Raja et al. Secured multi-keyword ranked search over encrypted cloud data
US11308233B2 (en) Method for information retrieval in an encrypted corpus stored on a server
Xu et al. Achieving fine-grained multi-keyword ranked search over encrypted cloud data
Rahman et al. A novel privacy preserving search technique for stego data in untrusted cloud
Arora et al. Update enabled multi-keyword searchable encryption scheme for secure data outsourcing
Pramanick et al. Searchable encryption with pattern matching for securing data on cloud server
Mlgheit et al. Security Model for Preserving Privacy over Encrypted Cloud Computing
Li et al. Achieving efficient and privacy-preserving multi-feature search for mobile sensing