Privacy enhancement using selective encryption scheme in data outsourcing
نویسندگان
چکیده
منابع مشابه
Selective data outsourcing for enforcing privacy
Existing approaches for protecting sensitive information outsourced at external “honest-but-curious” servers are typically based on an overlying layer of encryption applied to the whole database, or on the combined use of fragmentation and encryption. In this paper, we put forward a novel paradigm for preserving privacy in data outsourcing, which departs from encryption. The basic idea is to in...
متن کاملUsing Shamir's Secret Sharing Scheme and Symmetric Key Encryption to Achieve Data Privacy in Databases
The Internet has become an essential tool for communication and information access, and with growing demand, new challenges and usage continue to surface. A complimentary tool that came to exist in recent years is Cloud Computing an economical solution that serves as an alternative to owning and running computing facilities. While cloud computing has many advantages, there are a number of issue...
متن کاملPrivacy-preserving encryption scheme using DNA parentage test
Consider the following practical scenario. Amother Alice would like to make her assets accessible only to her descen-dents. In order to do so, she encrypts her secret Swiss bank account with her DNA sequences, and provides this information to her descendents. To simplify the scenario and without losing generality, we assume that Alice has only one son, named Bob. Therefore, Alice provides the c...
متن کاملPrivacy enhanced data outsourcing in the cloud
How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that al...
متن کاملPrivacy-Preserving Data Outsourcing in Cloud Computing
In cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2016
ISSN: 1550-1477,1550-1477
DOI: 10.1177/1550147716657255