4.7 Article

Privacy-preserving data utilization in hybrid clouds

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.future.2013.06.011

关键词

Privacy-preserving keyword search; Fuzzy keyword search; Fine-grained access control; Attribute-based encryption; Cloud computing

资金

  1. National Key Basic Research Program of China [2013CB834204]
  2. National Natural Science Foundation of China [61272423, 61100224, 61272455]
  3. Specialized Research Fund for the Doctoral Program of Higher Education of China [20100031110030, 20120031120036]
  4. Grant for Universities in Guangzhou City [10A008]
  5. Foundation for Distinguished Young Talents in Higher Education of Guangdong Province [LYM10106]

向作者/读者索取更多资源

As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud, which raises a new challenge on how to utilize the outsourced data in a privacy-preserving manner. Although searchable encryption allows for privacy-preserving keyword search over encrypted data, it could not work effectively for restricting unauthorized access to the outsourced private data. In this paper, aiming at tackling the challenge of privacy-preserving utilization of data in cloud computing, we propose a practical hybrid architecture in which a private cloud is introduced as an access interface between the data owner/user and the public cloud. Under this architecture, a data utilization system is provided to achieve both exact keyword search and fine-grained access control over encrypted data. Security and efficiency analysis for the proposed system are presented in detail. Then, further enhancements for this system are considered in two steps. (1) We show how to extend our system to support efficient fuzzy keyword search while overcoming the disadvantage of insignificant decryption in the existing privacy-preserving fuzzy keyword search scheme. (2) We demonstrate approaches to realize an outsourcing cryptographic access control mechanism and further reduce the computational cost at the data user side. (C) 2013 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

PAS: policy-based assistance in sensor networks

Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang, Wei Jiang

COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Secure Auditing and Deduplicating Data in Cloud

Jingwei Li, Jin Li, Dongqing Xie, Zhang Cai

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Hardware & Architecture

MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection

Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Article Computer Science, Hardware & Architecture

The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System

Chuan Qin, Jingwei Li, Patrick P. C. Lee

ACM TRANSACTIONS ON STORAGE (2017)

Article Computer Science, Information Systems

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds

Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Jin Li, Chunfu Jia

IEEE TRANSACTIONS ON CLOUD COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses

Jingwei Li, Patrick P. C. Lee, Chufeng Tan, Chuan Qin, Xiaosong Zhang

ACM TRANSACTIONS ON STORAGE (2020)

Article Computer Science, Hardware & Architecture

Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication

Jingwei Li, Suyu Huang, Yanjing Ren, Zuoru Yang, Patrick P. C. Lee, Xiaosong Zhang, Yao Hao

Summary: Metadedup is an encrypted deduplication storage system that reduces metadata storage overhead by applying deduplication to metadata. It achieves fault-tolerant storage and security guarantees through distributed key management. Extensive evaluations show high throughput and significant metadata storage savings.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution

Jingwei Li, Guoli Wei, Jiacheng Liang, Yanjing Ren, Patrick P. C. Lee, Xiaosong Zhang

Summary: Encrypted deduplication provides security and storage efficiency in large-scale storage systems, but its deterministic nature allows attackers to conduct frequency analysis. This paper proposes a distribution-based attack that models the relative frequency distributions of plaintexts and ciphertexts, improving the inference precision and evaluating the actual damage.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Accelerating Encrypted Deduplication via SGX

Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick P. C. Lee, Xiaosong Zhang

Summary: SGXDedup leverages Intel SGX to enhance the speed of encrypted deduplication while preserving security through secure interfaces and efficient enclave operations, achieving significant speedups and maintaining high bandwidth and storage savings in both synthetic and real-world workloads.

PROCEEDINGS OF THE 2021 USENIX ANNUAL TECHNICAL CONFERENCE (2021)

Proceedings Paper Computer Science, Theory & Methods

Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication

Jingwei Li, Zuoru Yang, Yanjing Ren, Patrick P. C. Lee, Xiaosong Zhang

PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Information Leakage in Encrypted Deduplication via Frequency Analysis

Jingwei Li, Chuan Qin, Patrick P. C. Lee, Xiaosong Zhang

2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2017)

Proceedings Paper Computer Science, Information Systems

Efficient Network Path Verification for Policy-routed Queries

Sushama Karumanchi, Jingwei Li, Anna Squicciarini

CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (2016)

Article Computer Science, Software Engineering

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal

Mingqiang Li, Chuan Qin, Jingwei Li, Patrick P. C. Lee

IEEE INTERNET COMPUTING (2016)

Proceedings Paper Computer Science, Theory & Methods

Policy Driven Node Selection in MapReduce

Anna C. Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li

INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I (2015)

Proceedings Paper Computer Science, Theory & Methods

Securing Resource Discovery in Content Hosting Networks

Sushama Karumanchi, Jingwei Li, Anna Squicciarini

INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I (2015)

Editorial Material Computer Science, Theory & Methods

Artificial intelligence in biomedical big data and digital healthcare

Kiho Lim, Christian Esposito, Tian Wang, Chang Choi

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Cluster and cloud computing for life sciences

Jesus Carretero, Dagmar Krefting

Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Adaptive asynchronous federated learning

Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab

Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

METSM: Multiobjective energy-efficient task scheduling model for an edge heterogeneous multiprocessor system

Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen

Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Preface of special issue on heterogeneous information network embedding and applications

Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Group key management in the Internet of Things: Handling asynchronicity

Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues

Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Multi-task peer-to-peer learning using an encoder-only transformer model

Robert Sajina, Nikola Tankovic, Ivo Ipsic

Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

On the impact of event-driven architecture on performance: An exploratory study

Hebert Cabane, Kleinner Farias

Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Federated Deep Learning for Wireless Capsule Endoscopy Analysis: Enabling Collaboration Across Multiple Data Centers for Robust Learning of Diverse Pathologies

Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad

Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

A sustainable Bitcoin blockchain network through introducing dynamic block size adjustment using predictive analytics

Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan

Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Leveraging a visual language for the awareness-based design of interaction requirements in digital twins

Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo

Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Performance analysis of parallel composite service-based applications in clouds

Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng

Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks

Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee

Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing

Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup

Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation

Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu

Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)