14 research outputs found
Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data
Multi-user multi-keyword ranked search scheme in arbitrary language is a
novel multi-keyword rank searchable encryption (MRSE) framework based on
Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous
MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption
(KNN-SE) algorithm, it can mitigate some draw-backs and achieve better
performance in terms of functionality and efficiency. Additionally, it does not
require a predefined keyword set and support keywords in arbitrary languages.
However, due to the pattern of exact matching of keywords in the new MRSE
scheme, multilingual search is limited to each language and cannot be searched
across languages. In this pa-per, we propose a cross-lingual multi-keyword rank
search (CLRSE) scheme which eliminates the barrier of languages and achieves
semantic extension with using the Open Multilingual Wordnet. Our CLRSE scheme
also realizes intelligent and per-sonalized search through flexible keyword and
language prefer-ence settings. We evaluate the performance of our scheme in
terms of security, functionality, precision and efficiency, via extensive
experiments
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
The combination of smart home platforms and automation apps introduces much
convenience to smart home users. However, this also brings the potential for
privacy leakage. If a smart home platform is permitted to collect all the
events of a user day and night, then the platform will learn the behavior
patterns of this user before long. In this paper, we investigate how IFTTT, one
of the most popular smart home platforms, has the capability of monitoring the
daily life of a user in a variety of ways that are hardly noticeable. Moreover,
we propose multiple ideas for mitigating privacy leakages, which altogether
forms a Filter-and-Fuzz (F&F) process: first, it filters out events unneeded by
the IFTTT platform; then, it fuzzes the values and frequencies of the remaining
events. We evaluate the F&F process, and the results show that the proposed
solution makes IFTTT unable to recognize any of the user's behavior patterns