2,707 research outputs found
Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data
Multi-user multi-keyword ranked search scheme in arbitrary language is a
novel multi-keyword rank searchable encryption (MRSE) framework based on
Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous
MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption
(KNN-SE) algorithm, it can mitigate some draw-backs and achieve better
performance in terms of functionality and efficiency. Additionally, it does not
require a predefined keyword set and support keywords in arbitrary languages.
However, due to the pattern of exact matching of keywords in the new MRSE
scheme, multilingual search is limited to each language and cannot be searched
across languages. In this pa-per, we propose a cross-lingual multi-keyword rank
search (CLRSE) scheme which eliminates the barrier of languages and achieves
semantic extension with using the Open Multilingual Wordnet. Our CLRSE scheme
also realizes intelligent and per-sonalized search through flexible keyword and
language prefer-ence settings. We evaluate the performance of our scheme in
terms of security, functionality, precision and efficiency, via extensive
experiments
Comparitive Study on Secure Data Retrieval Framework for Military Networks
In the immensely colossal number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the conventional medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of eccentric system network and frequent partitions. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that sanction remote contrivance conveyed by officers to verbalize with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Thus an incipient methodology is introduced to provide prosperous communication between each other as well as access the confidential information provided by some major ascendant entities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for sanction policies and the policies update for secure data retrieval in most challenging cases. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Predicated Encryption (CP-ABE). Some of the most challenging issues in this scenario are the enforcement of sanction policies and the policies update for secure data retrieval. Ciphertext -policy attribute-predicated encryption (CP-ABE) is a assuring cryptographic answer for the right to gain ingress control issues. However, the quandary of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different ascendant entities. In this paper, we propose a secure data retrieval scheme utilizing CP-ABE for decentralized DTNs where multiple key ascendant entities manage their attributes independently..We demonstrate how to apply the proposed mechanism to safely and proficiently deal with the relegated information dispersed in the Interruption or disruption tolerant network
DOI: 10.17762/ijritcc2321-8169.16046
Synchronous Relaying Of Sensor Data
In this paper we have put forth a novel methodology to relay data obtained by
inbuilt sensors of smart phones in real time to remote database followed by
fetching of this data . Smart phones are becoming very common and they are
laced with a number of sensors that can not only be used in native applications
but can also be sent to external nodes to be used by third parties for
application and service development
Interim research assessment 2003-2005 - Computer Science
This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities
Robust Data Management
Mobility gains more and more importance from a technological as well as social perspective. On the one hand, mobility is required from the personal and professional environment in order to keep pace with the developments in a global world. On the other hand, the existence of wireless networks and the success of cell-phones enable a wide usage of mobile communication infrastructure. While mobile devices (especially cell-phone) are becoming more and more a general vehicle to perform a wide spectrum of applications like internet browsing, etc. many, many issues are still unsolved in order to provide a technologically solid and well accepted mobile infrastructure. In the following, we focus on the term of robustness as a mean to achieve this goal. No only the general possibility to communicate via mobile devices using wireless networks is the question, but the reliable, secure, and finally simple way of doing it must be the core research in the context of mobile environments
- …