Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2023
PoRt: Non-Interactive Continuous Availability Proof of Replicated Storage
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingPages 270–279https://doi.org/10.1145/3555776.3577741Secure cryptographic storage is one of the most important issues that both businesses and end-users take into account before moving their data to either centralized clouds or blockchain-based decentralized storage marketplace. Recent work [4] formalizes ...
- research-articleFebruary 2023
A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
AbstractData encryption‐based and secret sharing‐based data outsourcing schemes protect the confidentiality of sensitive attributes but not their secrecy. Ciphertexts/shares generated by a data encryption/secret sharing scheme can attract the attention of ...
This paper proposes a novel scheme that integrates data hiding with secret sharing for relational databases to protect both secrecy and confidentiality of secret attributes. To the best of our knowledge, this is the first work that protects the secrecy of ...
- research-articleMarch 2020
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyPages 121–132https://doi.org/10.1145/3374664.3375731Query processing over uncertain data has gained much attention recently. Due to the high computational complexity of query evaluation on uncertain data, the data owner can outsource her data to a server that provides query evaluation as a service. ...
- posterOctober 2018
Circular AON: A Very Fast Scheme to Protect Encrypted Data Against Key Exposure
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 2231–2233https://doi.org/10.1145/3243734.3278501In this poster, we introduce CAON: a novel variation of an all-ornothing transform that aims at protecting encrypted data against exposure of cryptographic material.We improve the fastest relevant scheme by reducing the number of exclusive-or operations ...
- research-articleOctober 2017
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control
SIN '17: Proceedings of the 10th International Conference on Security of Information and NetworksPages 11–18https://doi.org/10.1145/3136825.3136877Cloud storage service allows its users to store and share data in a cloud environment. To secure the data from unauthorized entities while sharing, cryptographic mechanisms are used. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one such ...
-
- research-articleJanuary 2017
Improved Write Access Control and Stronger Freshness Guarantee to Outsourced Data
ICDCN '17: Proceedings of the 18th International Conference on Distributed Computing and NetworkingArticle No.: 19, Pages 1–8https://doi.org/10.1145/3007748.3007778In secure data outsourcing, even a single unauthorized write operation may heavily ruin the data owner's business operations. Another potential issue is that the untrusted service provider may return stale data to mislead the readers. Existing work on ...
- research-articleMay 2016
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 605–616https://doi.org/10.1145/2897845.2897892In data outsourcing, a client stores a large amount of data on an untrusted server; subsequently, the client can request the server to compute a function on any subset of the data. This setting naturally leads to two security requirements: ...
- research-articleJanuary 2016
Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing
International Journal of High Performance Computing and Networking (IJHPCN), Volume 9, Issue 4Pages 299–309https://doi.org/10.1504/ijhpcn.2016.077822Cloud computing has emerged as a successful paradigm to deliver flexible and convenient data processing and sharing. Security and privacy management of outsourced data is among the top concerns for cloud adoption. To this end, attribute-based encryption ...
- research-articleOctober 2015
Securing outsourced database: architecture for protected web resource
CEE-SECR '15: Proceedings of the 11th Central & Eastern European Software Engineering Conference in RussiaArticle No.: 1, Pages 1–7https://doi.org/10.1145/2855667.2855668Outsourcing data and IT infrastructure can be profitable for business, but it raises severe privacy issues. Ordinary encryptions partially solve the problem, but they limits operations, which can be performed over encrypted data. In this paper, we ...
- ArticleJuly 2014
Specification and Deployment of Integrated Security Policies for Outsourced Data
DBSec 2014: Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566Pages 17–32https://doi.org/10.1007/978-3-662-43936-4_2This paper presents a well-founded language allowing in one hand data owners to easily specify their security and utility requirements over the data to be outsourced and in an another hand to formalize the set of security mechanisms that can be used for ...
- research-articleJune 2014
S-ORAM: a segmentation-based oblivious RAM
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 147–158https://doi.org/10.1145/2590296.2590323As outsourcing data to remote storage servers gets popular, protecting user's pattern in accessing these data has become a big concern. ORAM constructions are promising solutions to this issue, but their application in practice has been impeded by the ...
- research-articleMarch 2014
Identity‐based remote data possession checking in public clouds
IET Information Security (ISE2), Volume 8, Issue 2Pages 114–121https://doi.org/10.1049/iet-ifs.2012.0271Checking remote data possession is of crucial importance in public cloud storage. It enables the users to check whether their outsourced data have been kept intact without downloading the original data. The existing remote data possession checking (RDPC) ...
- research-articleNovember 2013
Supporting complex queries and access policies for multi-user encrypted databases
CCSW '13: Proceedings of the 2013 ACM workshop on Cloud computing security workshopPages 77–88https://doi.org/10.1145/2517488.2517492Cloud computing is an emerging paradigm offering companies (virtually) unlimited data storage and computation at attractive costs. It is a cost-effective model because it does not require deployment and maintenance of any dedicated IT infrastructure. ...
- research-articleAugust 2013
Improving security and efficiency of time-bound access to outsourced data
Compute '13: Proceedings of the 6th ACM India Computing ConventionArticle No.: 9, Pages 1–8https://doi.org/10.1145/2522548.2522606In time-bound access control, access to the system resources by authorized users is limited to specific time periods. In 2012, Vimercati, Foresti, Jajodia and Livraga proposed a scheme for time-bound access control to outsourced data in cloud using ...
- research-articleMay 2013
Towards asymmetric searchable encryption with message recovery and flexible search authorization
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityPages 253–264https://doi.org/10.1145/2484313.2484346When outsourcing data to third-party servers, searchable encryption is an important enabling technique which simultaneously allows the data owner to keep his data in encrypted form and the third-party servers to search in the ciphertexts. Motivated by ...
- ArticleMarch 2013
Confidentiality-Preserving query execution of fragmented outsourced data
ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication TechnologyPages 426–440https://doi.org/10.1007/978-3-642-36818-9_47Ensuring confidentiality of outsourced data continues to be an area of active research in the field of privacy protection. Almost all existing privacy-preserving approaches to address this problem rely on heavyweight cryptographic techniques with a ...
- research-articleFebruary 2013
Multi-user dynamic proofs of data possession using trusted hardware
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyPages 353–364https://doi.org/10.1145/2435349.2435400In storage outsourcing services, clients store their data on a potentially untrusted server, which has more computational power and storage capacity than the individual clients. In this model, security properties such as integrity, authenticity, and ...
- ArticleJuly 2012
Enforcing subscription-based authorization policies in cloud scenarios
DBSec'12: Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and PrivacyPages 314–329https://doi.org/10.1007/978-3-642-31540-4_24The rapid advances in the Information and Communication Technologies have brought to the development of on-demand high quality applications and services allowing users to easily access resources anywhere anytime. Users can pay for a service and access ...
- ArticleJuly 2012
k-anonymity-based horizontal fragmentation to preserve privacy in data outsourcing
DBSec'12: Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and PrivacyPages 263–273https://doi.org/10.1007/978-3-642-31540-4_20This paper proposes a horizontal fragmentation method to preserve privacy in data outsourcing. The basic idea is to identify sensitive tuples, anonymize them based on a privacy model and store them at the external server. The remaining non-sensitive ...
- ArticleMay 2012
Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies
CCGRID '12: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)Pages 923–930https://doi.org/10.1109/CCGrid.2012.117For cloud-based outsourcing of confidential data, various techniques based on cryptography or data-fragmentation have been proposed, each with its own tradeoff between confidentiality, performance, and the set of supported queries. However, it is ...