Abstract
Cloud platform provides storage space and access for large data sources, cloud computing technology is the key to supporting data technology. However the emergence of large data poses new challenges to traditional data security. This project mainly focuses on data security in the cloud computing environment outsourcing and retrieval, the key technology for solving the outsourcing of data processing, saving local computing resources, reduce computational overhead is of great importance, and for the promotion of health, cloud computing fast and long-term development is of great significance. Therefore, the research is not only of great theoretical significance, and has great practical value.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (2000)
Goh, E.J.: Secure indexes. Report 2003/216, Cryptology ePrint Archive, October 2003. http://eprint.iacr.org/2003/216
Chang, Y-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer (2005)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, October 2006
Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506–522. Springer (2004)
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: CRYPTO, LNCS 3621, pp. 205–222. Springer (2005)
Bao, F., Deng, R., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Information Security Practice and Experience, pp. 71–85. Springer (2008)
Zhao, F., Nishide, T., Sakurai, K.: Multi-user keyword search scheme for secure data sharing with fine-grained access control. In: Information Security and Cryptology - ICISC 2011, pp. 406–418. Springer (2012)
Zheng, Q., Xu, S., Ateniese, G.: Vabks: verifiable attribute-based keyword search over outsourced encrypted data. Cryptology ePrint Archive, report 2013/462 (2013)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2401003
Ma, M., He, D., Kumar, N., Choo, K.-K.R., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans. Ind. Inform. (2017) (in press)
Poh, G.S., Chin, J.-J., Yau, W.-C., Choo, K.-K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. (2017) (in press)
Liu, X., Deng, R.H., Choo, K.-K.R., Weng, J.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 11(11), 2401–2414 (2016)
Liu, X., Choo, K.-K.R., Deng, R.H., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Dependable Secure Comput. (2017). doi:10.1109/TDSC.2016.2536601
Ren, R., Liu, R., Lei, M., Choo, K.-K.R.: SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput. Stand. Interfaces (2017). doi:10.1016/j.csi.2016.09.001
Xiong, L., Choo, K.-K.R., Vasilakos, A.V.: Revocable identity-based access control for big data with verifiable outsourced computing. IEEE Trans. Big Data (2017). doi:10.1109/TBDATA.2017.2697448
Acknowledgment
The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. This work was supported in part the National Natural Science Foundation of China under Grant 61300202, 61332018, 61403084. Our research was sponsored by Program of Science and Technology Commission of Shanghai Municipality (No. 15530701300, 15XD15202000, 16511101700), in part by the technical research program of Chinese ministry of public security (2015JSYJB26).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Wang, Z. (2018). Research on Security Outsourcing Privacy in Cloud Environments. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-67071-3_4
Published:
Publisher Name: Edizioni della Normale, Cham
Print ISBN: 978-3-319-67070-6
Online ISBN: 978-3-319-67071-3
eBook Packages: EngineeringEngineering (R0)