521 research outputs found

    Privacy-preserving targeted advertising scheme for IPTV using the cloud

    Get PDF
    In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server. To provide high quality directed advertising service, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are published on the cloud server periodically (e.g. weekly) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the cloud, are considered (trade) secrets and therefore are protected as well. The cloud is oblivious to the published data, the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with a so-called {\em trapdoor} by the IPTV, can query the cloud and utilize the query results. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage

    Efficient Multi - Keyword Ranked Search over Encrypted Cloud Computing

    Get PDF
    Cloud computing allow customer to store their data on remote site so it reduce burden on local complex data storing. But before storing sensitive data it can encrypted and this can overcome plaintext keyword search.AS large number of user and data on cloud and for search on that data allow multi keyword search also provide result similarity ranking for effective retrieval of data. From number of multi-keyword semantics to identify similarity between search query and data highly efficient rule of coordinate matching, i.e., as many matches as possible, and then use inner data similarity for quantitatively similarity measure. In this system, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE),and establish a set of strict privacy requirements for such a secure cloud data utilization system to be implemented in real. We first propose basic idea of different privacy preserving multi-keyword search technique along with search on data that store on cloud in encrypted form and maintaining the integrity of rank order in search result and the cloud server is untrusted. .By hiding the user’s identity, the confidentiality of user’s data is maintaine

    DYNAMIC SEARCHABLE OVER ENCRYPTED CLOUD DATA FOR MULTI KEYWORD RANKED SEARCH SCHEME

    Get PDF
    As a result of rising status of cloud computing, increasingly more information proprietors tend to be provoked to subcontract their data to cloud machines for huge expediency and cost this is certainly abridged information company. However, responsive information must be encrypted before outsourcing for solitude needs, which obsoletes data operation akin to document retrieval that is keyword-based. In this article, we truth be told there a cramped multi-keyword ranked research method over encrypted cloud data, which simultaneously chains modernize this is certainly lively like removal and insertion of papers. Particularly, the vector space model and also the TF this is certainly widely-used IDF are mutual in the index building and query generation. We produce a certain directory site this is certainly tree-based and recommend a “Greedy Depth-first Search” algorithm to give efficient multi-keyword rated search. The kNN that is secure is useful to encrypt the index and query vectors, and meanwhile guarantee precise value score calculation between encrypted index and query vectors. To be able to withstand attacks which are numerical apparition terms are added to the index vector for blinding search results. As a result of utilize of your certain index this is certainly tree-based, the planned system can realize sub-linear search time and contract with the removal and introduction of documents athletically. Extensive experiments are carried out showing the competence associated with suggested plan

    Split keyword fuzzy and synonym search over encrypted cloud data

    Get PDF
    A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy. The encrypted data is search based on keywords and retrieve interested files by data user using a lot of traditional Search scheme. Existing search schemes supports exact keyword match or fuzzy keyword search, but synonym based multi-keyword search are not supported. In the real world scenario, cloud users may not know the exact keyword for searching and they might give synonym of the keyword as the input for search instead of exact or fuzzy keyword due to lack of appropriate knowledge of data. In this paper, we describe an efficient search approach for encrypted data called as Split Keyword Fuzzy and Synonym Search (SKFS). Multi-keyword ranked search with accurate keyword and Fuzzy search supports synonym queries are a major contribution of SKFS. The wildcard Technique is used to store the keywords securely within the index tree. Index tree helps to search faster, accurate and low storage cost. Extensive experimental results on real-time data sets shows, the proposed solution is effective and efficient for multi-keyword ranked search and synonym queries Fuzzy based search over encrypted cloud data. © 2017 Springer Science+Business Media, LL

    A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage

    Full text link
    Security has become a significant concern with the increased popularity of cloud storage services. It comes with the vulnerability of being accessed by third parties. Security is one of the major hurdles in the cloud server for the user when the user data that reside in local storage is outsourced to the cloud. It has given rise to security concerns involved in data confidentiality even after the deletion of data from cloud storage. Though, it raises a serious problem when the encrypted data needs to be shared with more people than the data owner initially designated. However, searching on encrypted data is a fundamental issue in cloud storage. The method of searching over encrypted data represents a significant challenge in the cloud. Searchable encryption allows a cloud server to conduct a search over encrypted data on behalf of the data users without learning the underlying plaintexts. While many academic SE schemes show provable security, they usually expose some query information, making them less practical, weak in usability, and challenging to deploy. Also, sharing encrypted data with other authorized users must provide each document's secret key. However, this way has many limitations due to the difficulty of key management and distribution. We have designed the system using the existing cryptographic approaches, ensuring the search on encrypted data over the cloud. The primary focus of our proposed model is to ensure user privacy and security through a less computationally intensive, user-friendly system with a trusted third party entity. To demonstrate our proposed model, we have implemented a web application called CryptoSearch as an overlay system on top of a well-known cloud storage domain. It exhibits secure search on encrypted data with no compromise to the user-friendliness and the scheme's functional performance in real-world applications.Comment: 146 Pages, Master's Thesis, 6 Chapters, 96 Figures, 11 Table
    corecore