Raghavendra et al., 2016 - Google Patents
DRSIG: Domain and Range Specific Index Generation for Encrypted Cloud DataRaghavendra et al., 2016
- Document ID
- 14352938278113374394
- Author
- Raghavendra S
- Mara G
- Buyya R
- Rajuk V
- Iyengar S
- Patnaik L
- Publication year
- Publication venue
- 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT)
External Links
Snippet
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage. The confidential data is encrypt before uploading to the cloud server in order to …
- 238000000034 method 0 abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
- G06F17/30657—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108062485A (en) | A kind of fuzzy keyword searching method of multi-service oriented device multi-user | |
Pham et al. | Survey on secure search over encrypted data on the cloud | |
CN110222081B (en) | Data ciphertext query method based on fine-grained sequencing in multi-user environment | |
CN106934301A (en) | A kind of safely outsourced data processing method of relevant database for supporting ciphertext data manipulation | |
Khan et al. | Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data | |
Peng et al. | LS-RQ: A lightweight and forward-secure range query on geographically encrypted data | |
Chamili et al. | Searchable encryption: a review | |
Meharwade et al. | Efficient keyword search over encrypted cloud data | |
Song et al. | An efficient and privacy-preserving multi-user multi-keyword search scheme without key sharing | |
Lv et al. | RASK: Range spatial keyword queries on massive encrypted geo-textual data | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Sreekumari | Privacy-preserving keyword search schemes over encrypted cloud data: an extensive analysis | |
CN114254344A (en) | Private data range query method of shared database based on block chain | |
Raghavendra et al. | DRSIG: Domain and Range Specific Index Generation for Encrypted Cloud Data | |
Handa et al. | Efficient privacy‐preserving scheme supporting disjunctive multi‐keyword search with ranking | |
Raghavendra et al. | DRSMS: Domain and range specific multi-keyword search over encrypted cloud data | |
Hahn et al. | Efficient multi-user similarity search over encrypted data in cloud storage | |
Raja et al. | Secured multi-keyword ranked search over encrypted cloud data | |
US11308233B2 (en) | Method for information retrieval in an encrypted corpus stored on a server | |
Xu et al. | Achieving fine-grained multi-keyword ranked search over encrypted cloud data | |
Rahman et al. | A novel privacy preserving search technique for stego data in untrusted cloud | |
Arora et al. | Update enabled multi-keyword searchable encryption scheme for secure data outsourcing | |
Pramanick et al. | Searchable encryption with pattern matching for securing data on cloud server | |
Mlgheit et al. | Security Model for Preserving Privacy over Encrypted Cloud Computing | |
Li et al. | Achieving efficient and privacy-preserving multi-feature search for mobile sensing |