Skip to main content

Research on Security Outsourcing Privacy in Cloud Environments

  • Conference paper
  • First Online:
International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 580))

  • 1092 Accesses

Abstract

Cloud platform provides storage space and access for large data sources, cloud computing technology is the key to supporting data technology. However the emergence of large data poses new challenges to traditional data security. This project mainly focuses on data security in the cloud computing environment outsourcing and retrieval, the key technology for solving the outsourcing of data processing, saving local computing resources, reduce computational overhead is of great importance, and for the promotion of health, cloud computing fast and long-term development is of great significance. Therefore, the research is not only of great theoretical significance, and has great practical value.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55 (2000)

    Google Scholar 

  2. Goh, E.J.: Secure indexes. Report 2003/216, Cryptology ePrint Archive, October 2003. http://eprint.iacr.org/2003/216

  3. Chang, Y-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer (2005)

    Google Scholar 

  4. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, VA, October 2006

    Google Scholar 

  5. Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506–522. Springer (2004)

    Google Scholar 

  6. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: CRYPTO, LNCS 3621, pp. 205–222. Springer (2005)

    Google Scholar 

  7. Bao, F., Deng, R., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Information Security Practice and Experience, pp. 71–85. Springer (2008)

    Google Scholar 

  8. Zhao, F., Nishide, T., Sakurai, K.: Multi-user keyword search scheme for secure data sharing with fine-grained access control. In: Information Security and Cryptology - ICISC 2011, pp. 406–418. Springer (2012)

    Google Scholar 

  9. Zheng, Q., Xu, S., Ateniese, G.: Vabks: verifiable attribute-based keyword search over outsourced encrypted data. Cryptology ePrint Archive, report 2013/462 (2013)

    Google Scholar 

  10. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)

    Article  Google Scholar 

  11. Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)

    Article  Google Scholar 

  12. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2401003

    Google Scholar 

  13. Ma, M., He, D., Kumar, N., Choo, K.-K.R., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans. Ind. Inform. (2017) (in press)

    Google Scholar 

  14. Poh, G.S., Chin, J.-J., Yau, W.-C., Choo, K.-K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. (2017) (in press)

    Google Scholar 

  15. Liu, X., Deng, R.H., Choo, K.-K.R., Weng, J.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 11(11), 2401–2414 (2016)

    Article  Google Scholar 

  16. Liu, X., Choo, K.-K.R., Deng, R.H., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Dependable Secure Comput. (2017). doi:10.1109/TDSC.2016.2536601

    Google Scholar 

  17. Ren, R., Liu, R., Lei, M., Choo, K.-K.R.: SeGoAC: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput. Stand. Interfaces (2017). doi:10.1016/j.csi.2016.09.001

    Google Scholar 

  18. Xiong, L., Choo, K.-K.R., Vasilakos, A.V.: Revocable identity-based access control for big data with verifiable outsourced computing. IEEE Trans. Big Data (2017). doi:10.1109/TBDATA.2017.2697448

    Google Scholar 

Download references

Acknowledgment

The authors of this paper are members of Shanghai Engineering Research Center of Intelligent Video Surveillance. This work was supported in part the National Natural Science Foundation of China under Grant 61300202, 61332018, 61403084. Our research was sponsored by Program of Science and Technology Commission of Shanghai Municipality (No. 15530701300, 15XD15202000, 16511101700), in part by the technical research program of Chinese ministry of public security (2015JSYJB26).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuoyan Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Wang, Z. (2018). Research on Security Outsourcing Privacy in Cloud Environments. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67071-3_4

  • Published:

  • Publisher Name: Edizioni della Normale, Cham

  • Print ISBN: 978-3-319-67070-6

  • Online ISBN: 978-3-319-67071-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics