![]() Jonker, “Computationally efficient searchable symmetric encryption”, In Proc. Papamanthou, “Parallel and dynamic searchable symmetric encryption”, FC Okinawa, Japan, 2013, LNCS, Springer, Berlin, Germany, vol. Roeder, “Dynamic searchable symmetric encryption”, ACM CCS 12, Raleigh, NC, USA, pp. Strauss, “Divertible protocols and atomic proxy cryptography”, In Proceedings of Eurocrypt ’98, vol. Ateniese, “Identity-based proxy re-encryption”, ACNS, Proceedings of the 5th international conference on Applied Cryptography and Network Security” of Lecture Notes in Computer Science, vol. Hohenberger, “Key-private proxy re-encryption”, In CTRSA ’09 Proceedings of the Cryptographers’ Track at the RSA Conference, pp. Fu, “Plutus: scalable secure file sharing on untrusted storage”, In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, pp. thesis, Massachusetts Institute of Technology, Cambridge, MA.2005. Fu, Integrity and Access Control in Untrusted Content Distribution Networks, Ph.D. ![]() Jensen, “Cryptographic access control in a distributed file system”, In Proceedings of 8th ACM Symposium on Access Control Models and Technologies, pp. Boneh, “SiRiUS: securing remote untrusted storage”, in Proceedings of NDSS, ISOC. Fu, Group Sharing And Random Access In Cryptographic Storage File Systems, Master’s thesis, MIT, 1999.Į.-J. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. In this paper we introduce a novel cloud encryption gateway the goal of which is to protect users data in Dropbox and Google Drive without compromising the usability of those services and particularly providing search functionality over the encrypted data. However, there is no practical application of searchable encryption functionality in industry. The importance of such functionality raised with the wide adoption of public cloud storages such as Dropbox or Google Drive and this discipline gained high attention from research community. Meantime preventing the storage provider to learn either the data or even the search queries. Searchable encryption allows the user to store his data in untrusted environment such as public cloud storages in encrypted form but still be able to access the data via search. ![]() Searchable encryption, Public cloud storage, Cloud encryption gateway, Skycryptor Abstract ![]()
0 Comments
Leave a Reply. |