2,707 research outputs found

    Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data

    Full text link
    Multi-user multi-keyword ranked search scheme in arbitrary language is a novel multi-keyword rank searchable encryption (MRSE) framework based on Paillier Cryptosystem with Threshold Decryption (PCTD). Compared to previous MRSE schemes constructed based on the k-nearest neighbor searcha-ble encryption (KNN-SE) algorithm, it can mitigate some draw-backs and achieve better performance in terms of functionality and efficiency. Additionally, it does not require a predefined keyword set and support keywords in arbitrary languages. However, due to the pattern of exact matching of keywords in the new MRSE scheme, multilingual search is limited to each language and cannot be searched across languages. In this pa-per, we propose a cross-lingual multi-keyword rank search (CLRSE) scheme which eliminates the barrier of languages and achieves semantic extension with using the Open Multilingual Wordnet. Our CLRSE scheme also realizes intelligent and per-sonalized search through flexible keyword and language prefer-ence settings. We evaluate the performance of our scheme in terms of security, functionality, precision and efficiency, via extensive experiments

    Comparitive Study on Secure Data Retrieval Framework for Military Networks

    Get PDF
    In the immensely colossal number of outgrowing commercial environment each and everything depends on the other sources to transmit the data securely and maintain the data as well in the conventional medium. Portable nodes in military environments, for example, a front line or an antagonistic area are prone to experience the undergo of eccentric system network and frequent partitions. Disruption-tolerant network (DTN) innovations are getting to be fruitful results that sanction remote contrivance conveyed by officers to verbalize with one another and access the confidential data or secret data or summon dependably by abusing outside capacity nodes or storage nodes. Thus an incipient methodology is introduced to provide prosperous communication between each other as well as access the confidential information provided by some major ascendant entities like commander or other superiors. The methodology is called Disruption-Tolerant Network (DTN). This system provides efficient scenario for sanction policies and the policies update for secure data retrieval in most challenging cases. The most promising cryptographic solution is introduced to control the access issues called Cipher text Policy Attribute Predicated Encryption (CP-ABE). Some of the most challenging issues in this scenario are the enforcement of sanction policies and the policies update for secure data retrieval. Ciphertext -policy attribute-predicated encryption (CP-ABE) is a assuring cryptographic answer for the right to gain ingress control issues. However, the quandary of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different ascendant entities. In this paper, we propose a secure data retrieval scheme utilizing CP-ABE for decentralized DTNs where multiple key ascendant entities manage their attributes independently..We demonstrate how to apply the proposed mechanism to safely and proficiently deal with the relegated information dispersed in the Interruption or disruption tolerant network DOI: 10.17762/ijritcc2321-8169.16046

    Synchronous Relaying Of Sensor Data

    Full text link
    In this paper we have put forth a novel methodology to relay data obtained by inbuilt sensors of smart phones in real time to remote database followed by fetching of this data . Smart phones are becoming very common and they are laced with a number of sensors that can not only be used in native applications but can also be sent to external nodes to be used by third parties for application and service development

    Interim research assessment 2003-2005 - Computer Science

    Get PDF
    This report primarily serves as a source of information for the 2007 Interim Research Assessment Committee for Computer Science at the three technical universities in the Netherlands. The report also provides information for others interested in our research activities

    Robust Data Management

    Get PDF
    Mobility gains more and more importance from a technological as well as social perspective. On the one hand, mobility is required from the personal and professional environment in order to keep pace with the developments in a global world. On the other hand, the existence of wireless networks and the success of cell-phones enable a wide usage of mobile communication infrastructure. While mobile devices (especially cell-phone) are becoming more and more a general vehicle to perform a wide spectrum of applications like internet browsing, etc. many, many issues are still unsolved in order to provide a technologically solid and well accepted mobile infrastructure. In the following, we focus on the term of robustness as a mean to achieve this goal. No only the general possibility to communicate via mobile devices using wireless networks is the question, but the reliable, secure, and finally simple way of doing it must be the core research in the context of mobile environments

    A lightweight privacy-preserving CNN feature extraction framework for mobile sensing

    Get PDF
    • …
    corecore