Access the full text.
Sign up today, get DeepDyve free for 14 days.
D Boneh, GD Crescenzo, R Ostrovsky, G Persiano (2004)
EUROCRYPT
C Wang, N Cao, J Li, K Ren, W Lou (2010)
2010 IEEE 30th international conference on distributed computing systems (ICDCS)
H Hacigümüş, B Iyer, C Li, S Mehrotra (2002)
Proceedings of the 2002 ACM SIGMOD international conference on management of data
C Curino, E Jones, RA Popa, N Malviya, E Wu, S Madden, H Balakrishnan, N Zeldovich (2011)
5th biennial conference on innovative data systems research
DX Song, D Wagner, A Perrig (2000)
Proceedings of 2000 IEEE symposium on security and privacy
P Paillier (1999)
Proceedings of the 17th international conference on theory and application of cryptographic techniques
G Ateniese, K Fu, M Green, S Hohenberger (2006)
Improved proxy re-encryption schemes with applications to secure distributed storageACM Trans Inf Syst Secur, 9
M Armbrust (2010)
A view of cloud computingCommun ACM, 53
S Yu, C Wang, K Ren, W Lou (2010)
Proceedings of the 29th conference on information communications
P Paillier (2000)
Proceedings of the 6th international conference on the theory and application of cryptology and information security: advances in cryptology
M Freedman, K Nissim, B Pinkas (2004)
Efficient private matching and set intersection
R Buyya, CS Yeo, S Venugopal, J Broberg, I Brandic (2009)
Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utilityFuture Gener Comput Syst, 25
M Li, S Yu, N Cao, W Lou (2011)
2011 31st international conference on distributed computing systems (ICDCS)
Z Yang, S Zhong, RN Wright (2006)
Proc of 11th European symposium on research in computer security (Esorics)
A Singh, M Srivatsa, L Liu (2009)
Search-as-a-service: outsourced search over outsourced storageACM Trans Web, 3
Y Chang, M Mitzenmacher (2005)
Proc of 3rd applied cryptography and network security conference (ACNS)
RL Grossman (2009)
IT professional
LM Kaufman (2009)
Data security in the world of cloud computing
R Chow, P Golle, M Jakobsson, E Shi, J Staddon, R Masuoka, J Molina (2009)
Proceedings of the 2009 ACM workshop on cloud computing security
Encryption ensures confidentiality of the data outsourced to cloud storage services. Searching the encrypted data enables subscribers of a cloud storage service to access only relevant data, by defining trapdoors or evaluating search queries on locally stored indexes. However, these approaches do not consider access privileges while executing search queries. Furthermore, these approaches restrict the searching capability of a subscriber to a limited number of trapdoors defined during data encryption. To address the issue of privacy-aware data search, we propose Oblivious Term Matching (OTM). Unlike existing systems, OTM enables authorized subscribers to define their own search queries comprising of arbitrary number of selection criterion. OTM ensures that cloud service provider obliviously evaluates encrypted search queries without learning any information about the outsourced data. Our performance analysis has demonstrated that search queries comprising of 2 to 14 distinct search criteria cost only 0.03 to 1.09 $ per 1000 requests.
The Journal of Supercomputing – Springer Journals
Published: Oct 10, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.