Constructing dummy query sequences to protect location privacy and query privacy in location-based services

Z Wu, G Li, S Shen, X Lian, E Chen, G Xu - World Wide Web, 2021 - Springer
Location-based services (LBS) have become an important part of people's daily life.
However, while providing great convenience for mobile users, LBS result in a serious …

Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing

Q Liu, Y Peng, J Wu, T Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the ever-increasing amount of data resided in a cloud, how to provide users with secure
and practical query services has become the key to improve the quality of cloud services …

A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

PrivHome: Privacy-preserving authenticated communication in smart home environment

GS Poh, P Gope, J Ning - IEEE Transactions on Dependable …, 2019 - ieeexplore.ieee.org
A smart home enables users to access devices such as lighting, HVAC, temperature
sensors, and surveillance camera. It provides a more convenient and safe living …

Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search

Q Liu, Y Peng, S Pei, J Wu, T Peng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of cloud computing, a growing number of users are delegating clouds to
host their sensitive data. To preserve user privacy, it is suggested that data is encrypted …

Ranked keyword search over encrypted cloud data through machine learning method

Y Miao, W Zheng, X Jia, X Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Ranked keyword search over encrypted data has been extensively studied in cloud
computing as it enables data users to find the most relevant results quickly. However …

Graph partition based privacy-preserving scheme in social networks

H Zhang, L Lin, L Xu, X Wang - Journal of Network and Computer …, 2021 - Elsevier
With the development of social networks, more and more data about users are released on
social platforms such as Facebook, Enron, WeChat, in terms of social graphs. Without the …

Verifiable keyword search supporting sensitive information hiding for the cloud-based healthcare sharing system

X Ge, J Yu, R Hao, H Lv - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
With the integration of the healthcare system, Internet of Things, and cloud storage service,
more and more medical institutions upload their electronic medical records (EMRs) to the …

A novel privacy preserving framework for large scale graph data publishing

X Ding, C Wang, KKR Choo… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
The need to efficiently store and query large scale graph datasets is evident in the growing
number of data-intensive applications, particularly to maximize the mining of intelligence …

Multi-security-level cloud storage system based on improved proxy re-encryption

J Shen, X Deng, Z Xu - EURASIP Journal on Wireless Communications …, 2019 - Springer
Based on the characteristics and data security requirements of the cloud environment, we
present a scheme for a multi-security-level cloud storage system that is combined with AES …