Secure Searchable Encryption and Data Management

This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security ...

Author: Brij B. Gupta

Publisher: CRC Press

ISBN: 9781000351200

Category: Computers

Page: 100

View: 725

Download →

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
Posted in:

Secure Searchable Encryption and Data Management

This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security ...

Author: Brij B. Gupta

Publisher: CRC Press

ISBN: 0367619679

Category:

Page: 116

View: 317

Download →

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
Posted in:

Data and Applications Security XXII

This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008.

Author: Vijay Atluri

Publisher: Springer Science & Business Media

ISBN: 9783540705666

Category: Business & Economics

Page: 345

View: 572

Download →

This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.
Posted in:

Cryptology and Network Security

30, 179–190 (2014) van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P.H., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Proceedings of Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, ...

Author: Yi Mu

Publisher: Springer Nature

ISBN: 9783030315788

Category: Computers

Page: 540

View: 264

Download →

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.
Posted in:

Secure Data Management

For instance, a variety of semantically secure searchable encryption techniques that can support various forms of keyword search as well as range searches have been proposed. Likewise, work in the area of Database As a Service (DAS) [7] ...

Author: Willem Jonker

Publisher: Springer

ISBN: 9783319068114

Category: Computers

Page: 139

View: 266

Download →

This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
Posted in:

Algorithms for Data and Computation Privacy

M. Bellare, A. Boldyreva, A. OíNeill, Deterministic and efficiently searchable encryption, in Proceedings of ... Computationally efficient searchable symmetric encryption, in Proceedings of Secure Data Management (SDM) (2010), pp.

Author: Alex X. Liu

Publisher: Springer Nature

ISBN: 9783030588960

Category: Computers

Page: 404

View: 752

Download →

This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook–Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
Posted in:

Algorithms and Architectures for Parallel Processing

To ensure data security, the data owner needs to encrypt the data before sending it to the cloud server. ... Keyword searchable encryption, which meets the requirement in data management, is proposed for secure data sharing.

Author: Jaideep Vaidya

Publisher: Springer

ISBN: 9783030050634

Category: Computers

Page: 662

View: 630

Download →

The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018. The 141 full and 50 short papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Distributed and Parallel Computing; High Performance Computing; Big Data and Information Processing; Internet of Things and Cloud Computing; and Security and Privacy in Computing.
Posted in:

Handbook of Computer Networks and Cyber Security

Computationally efficient searchable symmetric encryption. In Secure data management (pp. 87–100). Berlin: Springer. Kurosawa, K., & Ohtaki, Y. (2012). UC-secure searchable symmetric encryption. In Financial cryptography and data ...

Author: Brij B. Gupta

Publisher: Springer Nature

ISBN: 9783030222772

Category: Computers

Page: 959

View: 830

Download →

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Posted in:

Advances in Cryptology CRYPTO 2018

J. Algorithms 41(1), 69–85 (2001) Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Proceedings of the 16th International Conference on Financial Cryptography and Data Security, pp.

Author: Hovav Shacham

Publisher: Springer

ISBN: 9783319968841

Category: Computers

Page: 823

View: 329

Download →

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Posted in:

Big Data Concepts Theories and Applications

Section 8.4 analyzes trust management in big data and cloud environment, mainly focusing on trusted computing based ... Searchable encryption is a cryptographic primitive which allows a user to securely search over encrypted data via ...

Author: Shui Yu

Publisher: Springer

ISBN: 9783319277639

Category: Computers

Page: 437

View: 530

Download →

This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice. It also focuses on high level concepts such as definitions of Big Data from different angles; surveys in research and applications; and existing tools, mechanisms, and systems in practice. Each chapter is independent from the other chapters, allowing users to read any chapter directly. After examining the practical side of Big Data, this book presents theoretical perspectives. The theoretical research ranges from Big Data representation, modeling and topology to distribution and dimension reducing. Chapters also investigate the many disciplines that involve Big Data, such as statistics, data mining, machine learning, networking, algorithms, security and differential geometry. The last section of this book introduces Big Data applications from different communities, such as business, engineering and science. Big Data Concepts, Theories and Applications is designed as a reference for researchers and advanced level students in computer science, electrical engineering and mathematics. Practitioners who focus on information systems, big data, data mining, business analysis and other related fields will also find this material valuable.
Posted in:

Secure and Trust Computing Data Management and Applications

As far privacy and security are concerned, private identification schemes are based on searchable encryption principle. The main goal of searchable encryption [5, 10] is to store messages into an encrypted database while still enabling ...

Author: James J Jong Hyuk Park

Publisher: Springer Science & Business Media

ISBN: 9783642223389

Category: Computers

Page: 252

View: 214

Download →

This book constitutes the refereed proceedings of the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, held in Loutraki, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address various theories and practical applications of secure and trust computing and data management in future environments.
Posted in:

2000 IEEE Symposium on Security and Privacy

Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.

Author:

Publisher: IEEE

ISBN: 0769506658

Category: Computers

Page: 256

View: 984

Download →

Contains papers from a May 2000 symposium, covering all areas of computer security and electronic privacy. Papers were selected on the basis of scientific novelty, importance to the field, and technical quality. Material is in sections on access control, applications to cryptography, achievability of electronic privacy, protocol analysis and design, open source in security, intrusion detection, assurance, and key management. Specific topics include efficient authentication and signing of multicast streams over lossy channels, engineering tradeoffs and the evolution of provably secure protocols, and robust nonproprietary software. Lacks a subject index. Annotation copyrighted by Book News, Inc., Portland, OR.
Posted in:

Secure Data Management in Decentralized Systems

[1] builds a searchable encryption scheme using bilinear maps as described below. • KeyGen: The input security parameter, s, determines the size, p of the groups G\ and G2. The algorithm picks a random a € Z* and a generator # of G\ .

Author: Ting Yu

Publisher: Springer Science & Business Media

ISBN: 9780387276960

Category: Computers

Page: 462

View: 191

Download →

The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.
Posted in:

Data and Applications Security and Privacy XXXI

This book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017.

Author: Giovanni Livraga

Publisher: Springer

ISBN: 9783319611761

Category: Computers

Page: 556

View: 351

Download →

This book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on access control, privacy, cloud security, secure storage in the cloud, secure systems, and security in networks and Web.
Posted in:

Data Security in Cloud Storage

... Yuen TH (2016) An efficient non-interactive multi-client searchable encryption with support for Boolean queries. ... Workshop on secure data management, pp 75–83 Chen Y (2014) SPEKS: secure server-designation public key encryption ...

Author: Yuan Zhang

Publisher: Springer Nature

ISBN: 9789811543746

Category: Computers

Page: 171

View: 214

Download →

This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud storage and how attacks work in real situations, together with the countermeasures used to ensure the security of outsourced data. Furthermore, the book introduces a number of emerging technologies that hold considerable potential – for example, blockchain, trusted execution environment, and indistinguishability obfuscation – and outlines open issues and future research directions in cloud storage security. The topics addressed are important for the academic community, but are also crucial for industry, since cloud storage has become a fundamental component in many applications. The book offers a general introduction for interested readers with a basic modern cryptography background, and a reference guide for researchers and practitioners in the fields of data security and cloud storage. It will also help developers and engineers understand why some current systems are insecure and inefficient, and move them to design and develop improved systems.
Posted in:

Secure and Trust Computing Data Management and Applications

Another approach for searchable encryption is to use asymmetric encryption. The first scheme for searchable encryption that makes use of public key cryptography is the Public-Key Encryption with keyword Search (PEKS) scheme, ...

Author: Changhoon Lee

Publisher: Springer Science & Business Media

ISBN: 9783642223648

Category: Computers

Page: 205

View: 342

Download →

This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previously held from 2006 until 2010 in various locations. The 14 full papers of the IWCS 2011 and 10 papers of the STAVE 2011 workshop were carefully reviewed and individually selected from the lectures given at each workshop. The International Workshop on Convergence Security in Pervasive Environments, IWCS 2011, addresses the various theories and practical applications of convergence security in pervasive environments. The International Workshop on Security & Trust for Applications in Virtualized Environments, STAVE 2011, shows how current virtualization increases the sharing of compute, network and I/O resources with multiple users and applications in order to drive higher utilization rates, what replaces the traditional physical isolation boundaries with virtual ones.
Posted in:

Web Scale Data Management for the Cloud

The scheme fulfills security against an IND-CPA adversary in the random oracle model. Any anonymous identity-based encryption scheme can now be turned into a searchable encryption scheme [1]. In anonymous identity-based encryption ...

Author: Wolfgang Lehner

Publisher: Springer Science & Business Media

ISBN: 9781461468561

Category: Computers

Page: 193

View: 584

Download →

The efficient management of a consistent and integrated database is a central task in modern IT and highly relevant for science and industry. Hardly any critical enterprise solution comes without any functionality for managing data in its different forms. Web-Scale Data Management for the Cloud addresses fundamental challenges posed by the need and desire to provide database functionality in the context of the Database as a Service (DBaaS) paradigm for database outsourcing. This book also discusses the motivation of the new paradigm of cloud computing, and its impact to data outsourcing and service-oriented computing in data-intensive applications. Techniques with respect to the support in the current cloud environments, major challenges, and future trends are covered in the last section of this book. A survey addressing the techniques and special requirements for building database services are provided in this book as well.
Posted in:

Theory of Cryptography

Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Proceedings of the 16th International Conference on Financial Cryptography and Data Security, pp. 258–274 (2013) Kamara, S., Papamanthou, C., Roeder, ...

Author: Yael Kalai

Publisher: Springer

ISBN: 9783319705033

Category: Computers

Page: 778

View: 756

Download →

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Posted in:

Artificial Intelligence and Security

Behnia, R., Ozmen, M.O., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. ... keyword search schemes over encrypted data. In: Secure Data Management, Third VLDB Workshop, SDM, pp.

Author: Xingming Sun

Publisher: Springer Nature

ISBN: 9783030578848

Category: Computers

Page: 828

View: 457

Download →

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.
Posted in:

Security and Trust Management

Cash, D., Jaeger, J., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS 2014 (2014) 4. Chang, Y.-C., Mitzenmacher, ...

Author: Giovanni Livraga

Publisher: Springer

ISBN: 9783319680637

Category: Computers

Page: 235

View: 410

Download →

This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems.
Posted in: