Approaches and challenges of privacy preserving search over encrypted data

DVNS Kumar, PS Thilagam - Information Systems, 2019 - Elsevier
More and more data owners are encouraged to outsource their data onto cloud servers for
reducing infrastructure, maintenance cost and also to get ubiquitous access to their stored …

VMSE: Verifiable multi-keyword searchable encryption in multi-user setting supporting keywords updating

Y Liang, Y Li, K Zhang, Z Wu - Journal of Information Security and …, 2023 - Elsevier
Since the powerful storage capacity of the cloud platform, more and more people are willing
to store their files on the cloud service provider (CSP). In order to prevent the privacy of …

HERDE-MSNB: a predictive security architecture for IoT health cloud system

M Vedaraj, P Ezhumalai - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The application of IoT in the several fields is extending due to its simple and robust
functionality. Especially, with the advent of the IoT-cloud based devices, IoT are established …

Toward verifiable phrase search over encrypted cloud-based IoT data

X Ge, J Yu, F Chen, F Kong… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Phrase search encryption, as an important technique in cloud-based IoT system, allows
users to retrieve encrypted IoT data that contains a set of consecutive keywords. It plays an …

Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting

Y Fan, Z Liu - 2017 IEEE second international conference on …, 2017 - ieeexplore.ieee.org
Searchable encryption is crucial for the encrypted data utilization, especially in the database
generated by multiple owners. Many existing schemes support single keyword query, and …

Migrating data to the cloud: An analysis of cloud storage privacy and security issues and solutions

M Kuštelega, R Mekovec - CroDiM: International Journal of Marketing …, 2024 - hrcak.srce.hr
Sažetak The rise of a digital economy has transformed how individuals do business and
carry out daily tasks, including how data is maintained. Because of the vast amount of data …

Attribute Based Conjunctive Keywords Search with Verifiability and Fair Payment Using Blockchain

D Zhang, S Wang, Q Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud computing has brought great convenience to data storage and resource sharing,
however, there are still concerns about data security and service quality. Attribute-based …

[HTML][HTML] A Certificateless Verifiable Bilinear Pair-Free Conjunctive Keyword Search Encryption Scheme for IoMT

W Long, J Zeng, Y Wu, Y Gao, H Zhang - Electronics, 2024 - mdpi.com
With superior computing power and efficient data collection capability, Internet of Medical
Things (IoMT) significantly improves the accuracy and convenience of medical work. As …

云环境下安全的可验证多关键词搜索加密方案

张键红, 武梦龙, 王晶, 刘沛, 姜正涛, 彭长根 - 通信学报, 2021 - infocomm-journal.com
云计算的高虚拟化与高可扩展性等优势, 使个人和企业愿意外包加密数据到云端服务器. 然而,
加密后的外包数据破坏了数据间的关联性. 尽管能够利用可搜索加密(SE) 进行加密数据的文件 …

[PDF][PDF] 公钥可搜索加密体制综述

秦志光, 徐骏, 聂旭云, 熊虎 - Journal of Cyber Security 信息安全 …, 2017 - 159.226.95.92
摘要伴随着云计算技术的广泛应用, 外包到云服务器存储的数据通常采用密文方式进行存储以
确保数据安全和用户隐私. 可搜索加密体制允许用户对密文数据通过关键词进行检索 …