Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data
نویسندگان
چکیده
The public cloud data integrity auditing technique is used to check the of through Third Party Auditor (TPA). In order make it more practical, we propose a new paradigm called based on keyword with sensitive information privacy for encrypted data. This designed one most common scenario, that is, user concerns portion files contain his/her interested keywords. our proposed scheme, TPA who only provided keyword, can audit all user’s keyword. Meanwhile, cannot deduce about which and how many this These salient features are realized by leveraging newly Relation Authentication Label (RAL). RAL not authenticate relation queried but also be generate proof without exposure. We give concrete security analysis showing scheme satisfies correctness, soundness privacy. conduct detailed experiments show efficiency scheme.
منابع مشابه
Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data
To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data utilization becomes a significant challenge. Searchable encryption scheme has been developed to conduct retrieval over encrypted data. However, these schemes only support exact keyword search. Recent fuzzy search schemes mainly evaluate the similarity of keywords from the s...
متن کاملPrivacy Preserving Ranked Keyword Search over Encrypted Cloud Data
We present a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that has to be searched is outsourced to the local trusted server where the keyword set that is generated from the data files is also stored. This is done...
متن کاملPrivacy Preserving Keyword Search over Encrypted Cloud Data
Cloud computing enables the organizations to outsource their data by providing a service model called infrastructure as a service (IaaS). In a public cloud the infrastructure is owned and managed by a cloud service provider and is located in the provider’s control. To protect the privacy of sensitive data, documents have to be encrypted before outsourcing. When the number of encrypted documents...
متن کاملPrivacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing
Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. Devising an efficient and secure search scheme over encrypted data involves techniques from multiple domains – information retrieval for index representation, algorithms ...
متن کاملMuti-keyword Search with Preserving Privacy over Encrypted Data in the Cloud
Cloud computing has become fame in the society and more users and more data owners centralize their secure data into the cloud. As there is huge amount of data files that are stores in the cloud server, it is important to provide security for the cloud and for the keyword based search service to data user. Here in order to protect this data, sensitive data is usually encrypted before ending the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2022
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2021.3106780