Privacy Preserving and Loss Data Retrieval in Cloud Computing Using Bucket Algorithm

Author(s):  
T. Durga Nagarjuna ◽  
T. Anil Kumar ◽  
A. C. Santha Sheela
Author(s):  
Satti Rami Reddy ◽  
Satti Mouli Satti Reddy ◽  
Suja Cherukullapurath Mana ◽  
B.Keerthi Samhitha ◽  
Jithina Jose

2012 ◽  
Vol 35 (11) ◽  
pp. 2215 ◽  
Author(s):  
Fang-Quan CHENG ◽  
Zhi-Yong PENG ◽  
Wei SONG ◽  
Shu-Lin WANG ◽  
Yi-Hui CUI

2019 ◽  
Vol 140-141 ◽  
pp. 38-60 ◽  
Author(s):  
Josep Domingo-Ferrer ◽  
Oriol Farràs ◽  
Jordi Ribes-González ◽  
David Sánchez

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Run Xie ◽  
Chanlian He ◽  
Dongqing Xie ◽  
Chongzhi Gao ◽  
Xiaojun Zhang

With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.


2017 ◽  
Vol 74 ◽  
pp. 76-85 ◽  
Author(s):  
Ping Li ◽  
Jin Li ◽  
Zhengan Huang ◽  
Tong Li ◽  
Chong-Zhi Gao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document