A probabilistic model of information retrieval: development and comparative experiments Part 2
Information Processing and Management: an International Journal
Efficient single-pass index construction for text databases
Journal of the American Society for Information Science and Technology
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Searchable symmetric encryption: improved definitions and efficient constructions
Proceedings of the 13th ACM conference on Computer and communications security
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Introduction to Information Retrieval
Introduction to Information Retrieval
Lest we remember: cold boot attacks on encryption keys
SS'08 Proceedings of the 17th conference on Security symposium
Communications of the ACM
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
RACS: a case for cloud storage diversity
Proceedings of the 1st ACM symposium on Cloud computing
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
SPORC: group collaboration using untrusted cloud resources
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
DepSky: dependable and secure storage in a cloud-of-clouds
Proceedings of the sixth conference on Computer systems
CryptDB: protecting confidentiality with encrypted query processing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
Hi-index | 0.00 |
The article presents a solution for storage and management of private data kept in Internet Storage Clouds. The solution supports operations over the data kept ciphered, including reads, writes and searches based on multiple keywords and relevance classification. The approach is based on a middleware architecture supported by homomorphic encryption techniques combined with dynamic indexing mechanisms. The solution preserves conditions of privacy without need to either decipher data during operations in the cloud or transfer the data during searches. The article further describes an implementation prototype of the solution and its evaluation. The performance obtained in different implementation scenarios is analyzed and compared to a solution promoted by AMAZON S3. The evaluation shows that the solution is viable, offers more security and control for the user and does not aggravate conditions of latency and data availability.