Learn More
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best(More)
In current computing environments, collaborative computing has been a central concern in Ubiquitous, Convergent, and Social Computing. "MobiLife¿ and "MyLifeBits¿ are the leading projects for representing dailylifeservices and their systems require complicate and collaborative network systems. The collaborative computing environments remain in high(More)
One of the most substantial ways to protect users' sensitive information is encryption. This paper is about the keyword index search system on encrypted documents. It has been thought that the search with errors over encrypted data is impossible because 1 bit difference over plaintexts may reduce to enormous bits difference over cyphertexts. We propose a(More)
This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we(More)
Cloud computing technologies have conflicting advantages and disadvantages with smartcards. Smartcards have high level of security but severe hardware restrictions, while clouds computing technologies are made available as utility computing but face with challenges and issues in security. We combine cloud computing technologies with smartcards and design(More)
The goal of intrusion detection systems(IDS) is to protect from the signs of security problems. However, since an IDS usually depends on the monitored data and has to identify an intruder, the running of IDS comes to threaten users’ privacy. In this paper, we propose a new privacy preserving method in intrusion detection system by applying cryptographic(More)
One of the most substantial ways to protect sensitive information is encryption of data. However, the cryptographic method brings in some problems such as inefficiency and malfunctioning, especially impossibility of arithmetic. The previous works in this area have been proved insecure or can provide only a few or several SQL queries. Actually, there is no(More)