Provenance-based Classification Policy based on Encrypted Search

01/07/2020
by   Xinyu Fan, et al.
0

As an important type of cloud data, digital provenance is arousing increasing attention on improving system performance. Currently, provenance has been employed to provide cues regarding access control and to estimate data quality. However, provenance itself might also be sensitive information. Therefore, provenance might be encrypted and stored in the Cloud. In this paper, we provide a mechanism to classify cloud documents by searching specific keywords from their encrypted provenance, and we prove our scheme achieves semantic security. In term of application of the proposed techniques, considering that files are classified to store separately in the cloud, in order to facilitate the regulation and security protection for the files, the classification policies can use provenance as conditions to determine the category of a document. Such as the easiest sample policy goes like: the documents have been reviewed twice can be classified as "public accessible", which can be accessed by the public.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/24/2018

Survey on Secure Search Over Encrypted Data on the Cloud

Cloud computing has become a potential resource for businesses and indiv...
research
09/21/2018

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT

Phrase search allows retrieval of documents containing an exact phrase, ...
research
08/29/2019

Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

In the use of a cloud storage, sharing of data with efficient access con...
research
07/04/2021

SEC-NoSQL: Towards Implementing High Performance Security-as-a-Service for NoSQL Databases

During the last few years, the explosion of Big Data has prompted cloud ...
research
10/16/2018

A Retrieval Framework and Implementation for Electronic Documents with Similar Layouts

As the number of digital documents requiring investigation increases, it...
research
10/13/2020

CryptMPI: A Fast Encrypted MPI Library

The cloud infrastructure must provide security for High-Performance Comp...
research
03/13/2023

The Realizations of Steganography in Encrypted Domain

With the popularization and application of privacy protection technologi...

Please sign up or login with your details

Forgot password? Click here to reset