TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Data privacy is a growing challenge in cloud computing, as the users data are uploaded on a third party cloud. To preserve data privacy for user uploaded data, the data is encrypted and stored in cloud server. When the user request for data, it can be downloaded and decrypted from user side. Data encryption incurs high overhead, which make it necessary to find an efficient search scheme. Existing technique uses, single keyword search on encrypted data, in which user…

Read More

A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds

A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds Load-balanced flow scheduling for big data centers in clouds, in which a large amount of data needs to be transferred frequently among thousands of interconnected servers, is a key and challenging issue. The OpenFlow is a promising solution to balance data flows in a data center network through its programmatic traffic controller. Existing OpenFlow based scheduling schemes, however, statically set up routes only at the initialization stage of data transmissions, which suffers from dynamical flow distribution and…

Read More

Secure k-NN Query on Encrypted Cloud Data with Multiple Keys

Secure k-NN Query on Encrypted Cloud Data with Multiple Keys The k-nearest neighbors (k-NN) query is a fundamental primitive in spatial and multimedia databases. It has extensive applications in location-based services, classification & clustering and so on. With the promise of confidentiality and privacy, massive data are increasingly outsourced to cloud in the encrypted form for enjoying the advantages of cloud computing (e.g., reduce storage and query processing costs). Recently, many schemes have been proposed to support k-NN query on encrypted cloud data. However, prior works have all assumed that…

Read More

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing

Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing Privacy has become a considerable issue when the applications of big data are dramatically growing in cloud computing. The benefits of the implementation for these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably growing volume of data sizes has also resulted in many challenges in practice. The execution time of the data encryption is one of the serious issues during the data processing and transmissions. Many current applications abandon…

Read More

Power Consumption-Aware Virtual Machine Placement in Cloud Data Center

Power Consumption-Aware Virtual Machine Placement in Cloud Data Center A set of Virtual Machine (VM) allocators for Cloud Data Centers (DCs) that perform the joint allocation of computing and network resources. VM requests are defined in terms of system (CPU, RAM and Disk) and network (Bandwidth) resources. As concerns the first ones, we allocate VM resources following two different policies, namely Best Fit and Worst Fit, corresponding to consolidation and spreading strategies respectively. For each server, the allocators choose the network path that minimizes electrical power consumption, evaluated according to…

Read More

Fast Phrase Search for Encrypted Cloud Storage

Fast Phrase Search for Encrypted Cloud Storage Cloud computing has generated much interest in the research community in recent years for its many advantages, but has also raise security and privacy concerns. The storage and access of confidential documents have been identified as one of the central problems in the area. In particular, many researchers investigated solutions to search over encrypted documents stored on remote cloud servers. While many schemes have been proposed to perform conjunctive keyword search, less attention has been noted on more specialized searching techniques. In this…

Read More

Privacy and Security of Sharing Referral Medical Record for Health Care System

Privacy and Security of Sharing Referral Medical Record for Health Care System Sharing of health information become daily routines in which hospitals and clinics often refer patients to specialists because of their limited facilities, services, and number of specialist physicians. This paper proposed secure design for sharing referral medical record using HIBE (Hierarchical IDBased Encryption), that focused on the ability of sharing information and ensuring privacy of referral medical record. Our proposed system is able to secure referral medical record from third parties and only the referral physician that can…

Read More

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage In cloud storage services, deduplication technology is commonly used to reduce the space and bandwidth requirements of services by eliminating redundant data and storing only a single copy of them. Deduplication is most effective when multiple users outsource the same data to the cloud storage, but it raises issues relating to security and ownership. Proof of-ownership schemes allow any owner of the same data to prove to the cloud storage server that he owns the data in a robust way.…

Read More

Stochastic Decision Making for Adaptive Crowdsourcing in Medical Big-Data Platforms

Stochastic Decision Making for Adaptive Crowdsourcing in Medical Big-Data Platforms Two novel algorithms for adaptive crowdsourcing in medical imaging big-data platforms is considered, namely, a max-weight scheduling algorithm for medical cloud platforms and a stochastic decision-making algorithm for distributed power-and-latency-aware dynamic buffer management in medical devices. In the first algorithm, medical cloud platforms perform a joint queue-backlog and rate-aware scheduling decisions for matching deployed access points (APs) and medical users where APs are eventually connected to medical clouds. In the second algorithm, each scheduled medical device computes the amounts of…

Read More

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption

Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. A semi-anonymous privilege control…

Read More