2017
DOI: 10.1002/spe.2473
|View full text |Cite
|
Sign up to set email alerts
|

RESeED: A secure regular‐expression search tool for storage clouds

Abstract: Summary Lack of trust has become one of the main concerns of users who tend to utilize one or multiple Cloud providers. Trustworthy Cloud‐based computing and data storage require secure and efficient solutions which allow clients to remotely store and process their data in the Cloud. User‐side encryption is an established method to secure the user data on the Cloud. However, using encryption, we lose processing capabilities, such as searching, over the Cloud data. In this paper, we present RESeED, a tool that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 42 publications
0
9
0
Order By: Relevance
“…Galois-field-based syndromes to improve fault-tolerance; PEKS-like [11,16] regular expression based keywords and meta-keywords for privacy-preserving search [85,86]; and a dynamically-sized payload as pictured in Fig. 7.…”
Section: Trustworthy Messaging For Aviation Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Galois-field-based syndromes to improve fault-tolerance; PEKS-like [11,16] regular expression based keywords and meta-keywords for privacy-preserving search [85,86]; and a dynamically-sized payload as pictured in Fig. 7.…”
Section: Trustworthy Messaging For Aviation Systemsmentioning
confidence: 99%
“…Each data object transmits with a further modification to add encryption using current standards for end-toend encryption, such as ECCDHE [87,88]. Trap-door encrypted keywords included with the transmission enable intermediaries to route and index information securely using the RESeED framework for regular-expression based search over encrypted data [85,86]. This allows the data to be transmitted in a semi-oblivious manner.…”
Section: Trustworthy Messaging For Aviation Systemsmentioning
confidence: 99%
“…Sun et al 14 35-37,40,48 49,50 N/A Wang et al 35,36 Regular Expression Search N/A N/A N/A Salehi et al 20,51 Other works 11,13,25,32,36,37 Semantic Search Other works 14,18,28,35,54 Other works 14,18,28,35 Woodworth et al 28 Other works 26,28,54 Other works 14,15,21,28 of the two schemes called WBSKS. In the SBKS scheme, alongside the process of extracting important keywords of the document, synonyms that represent the semantic of a document are collected.…”
Section: Ontological Semantic Searchmentioning
confidence: 99%
“…For instance, in S3C [35] search tool, for a 100-petabyte dataset the index size grows to ≈ 300 GB. Traversing such a large index affects searching timeliness and can be potentially impacted by hardware limitations [32]. To resolve the bottleneck, the index structure can be partitioned to several clusters [12], [36].…”
Section: Introductionmentioning
confidence: 99%
“…For a given search query, instead of searching the whole index, the search space is pruned and gets limited to only those clusters that are topically related to the search query. The pruning is achieved based on a set of Abstract structures (denoted a 1 , ..., a n ) that are sampled from each one of the clusters and reside either on the client tier or possibly on a trusted edge server [32]. Details of the way abstracts are created described in [21] [11].…”
Section: Introductionmentioning
confidence: 99%