• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 237
Next 10 →

SEARCH ON THE CLOUD FILE SYSTEM

by Rodrigo Savage, Dulce Tania Nava, Norma Elva Chávez, Norma Saiph Savage
"... Research in peer-to-peer file sharing systems has focused on tackling the design constraints encountered in distributed systems, while little attention has been devoted to the user experience: these systems always assume the user knows the public key of the file they are searching. Yet average users ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Research in peer-to-peer file sharing systems has focused on tackling the design constraints encountered in distributed systems, while little attention has been devoted to the user experience: these systems always assume the user knows the public key of the file they are searching. Yet average

SCOPE: Easy and Efficient Parallel Processing of Massive Data Sets

by Ronnie Chaiken, Bob Jenkins, Per-åke Larson, Bill Ramsey, Darren Shakib, Simon Weaver, Jingren Zhou
"... Companies providing cloud-scale services have an increasing need to store and analyze massive data sets such as search logs and click streams. For cost and performance reasons, processing is typically done on large clusters of shared-nothing commodity machines. It is imperative to develop a programm ..."
Abstract - Cited by 206 (9 self) - Add to MetaCart
Companies providing cloud-scale services have an increasing need to store and analyze massive data sets such as search logs and click streams. For cost and performance reasons, processing is typically done on large clusters of shared-nothing commodity machines. It is imperative to develop a

Verifying Data Integrity in Cloud

by S. P. Jaikar, M. V. Nimbalkar
"... Clouds are revolution in computing field which provides on demand access to virtualized resources which are hosted outside of your own data center. In Cloud computing, data and applications are moved to large data centers where management of data is not fully trustworthy. Secure outsourcing of data ..."
Abstract - Add to MetaCart
to ensure users that their data are indeed stored appropriately and kept intact all the time in the cloud. We are using erasure correcting code in the file distribution preparation to provide redundancies. We are relaying on challenge response protocol along with pre-computed tokens to verify the storage

Secure Ranked Keyword Search over Encrypted Cloud Data

by Cong Wang, et al.
"... As Cloud Computing Becomes Prevalent information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption sc ..."
Abstract - Cited by 80 (7 self) - Add to MetaCart
schemes allow users to securely search over encrypted data through keywords, these techniques support only boolean search, without capturing any relevance of data files. This approach suffers from two main drawbacks when directly applied in the context of Cloud Computing. On the one hand, users, who do

Catch You If You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data

by unknown authors
"... Abstract—Encrypted data search allows cloud to offer funda-mental information retrieval service to its users in a privacy-preserving way. In most existing schemes, search result is re-turned by a semi-trusted server and usually considered authentic. However, in practice, the server may malfunction o ..."
Abstract - Add to MetaCart
that enables users to conduct secure conjunctive keyword search, update the outsourced file collection and verify the authenticity of the search result efficiently. The proposed verification mechanism is efficient and flexible, which can be either delegated to a public trusted authority (TA) or be executed

Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud,”

by Jie Wang , Xiao Yu , Ming Zhao , Ming Zhao - International Journal of Network Security, , 2015
"... Abstract As cloud computing is increasingly expanding its application scenario, it is vital for cloud storage customers not to sacrifice the confidentiality of sensitive data while making fullest use of operational functionality of cloud secure systems. Although traditional searchable encryption ca ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
-based keyword construction scheme, we generate fuzzy keyword set, and build secure index for efficient fuzzy search. After searching procedures, the scheme can support verifiability of returned files via proof returned by cloud as well, and interaction between data user and private cloud to achieve dynamic

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,"

by Ning Cao , Cong Wang , Ming Li , Kui Ren , Wenjing Lou - Proc. IEEE INFOCOM, , 2014
"... Abstract-With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, w ..."
Abstract - Cited by 89 (10 self) - Add to MetaCart
, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the large number of data users and documents in cloud, it is crucial for the search service to allow multi-keyword query

Structured Search Result Differentiation

by Ziyang Liu, Peng Sun, Yi Chen
"... Studies show that about 50 % of web search is for information exploration purpose, where a user would like to investigate, compare, evaluate, and synthesize multiple relevant results. Due to the absence of general tools that can effectively analyze and differentiate multiple results, a user has to m ..."
Abstract - Cited by 22 (2 self) - Add to MetaCart
Studies show that about 50 % of web search is for information exploration purpose, where a user would like to investigate, compare, evaluate, and synthesize multiple relevant results. Due to the absence of general tools that can effectively analyze and differentiate multiple results, a user has

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data

by Qingji Zheng, Shouhuai Xu
"... Abstract—It is quite common nowadays for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: How can the authorized data users search over a data owner’s outsourced encrypt ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
encrypted data? How should a data owner grant search capabilities to data users? How can data users be assured that the cloud faithfully executed the search operations on their behalf? Towards ultimately addressing these problems, in this paper we propose a novel cryptographic solution, called verifiable

Verifying Outsourced Replicated Data in Cloud Computing Storage Systems

by Ayad F. Barsoum, M. Anwar Hasan
"... Storage-as-a-Service offered by cloud service providers (CSPs) en-ables customers to store and retrieve almost unlimited amount of data by paying fees metered in GB/month. For an increased level of scalability, availability and durability, some customers may want their data to be replicated on multi ..."
Abstract - Add to MetaCart
to access the owner’s file) to seamlessly access the file copies stored by the CSP, and supports public verifiability. The proposed scheme is proved to be secure against colluding servers. We illus-trate the performance of the PB-PMDP scheme through theoreti-cal analysis, which is then validated
Next 10 →
Results 1 - 10 of 237
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University