Efficient and privacy-preserving spatial keyword similarity query over encrypted data

S Zhang, S Ray, R Lu, Y Guan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As a popular and practical query type in location-based services, the spatial keyword query
has been extensively studied in both academia and industry. Meanwhile, with the growing …

Forward/backward and content private DSSE for spatial keyword queries

X Wang, J Ma, X Liu, Y Miao, Y Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Spatial keyword queries are attractive techniques that have been widely deployed in real-life
applications in recent years, such as social networks and location-based services. However …

Lightweight privacy-preserving spatial keyword query over encrypted cloud data

Y Yang, Y Miao, KKR Choo… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
With the rapid development of geographic location technology and the explosive growth of
data, a large amount of spatio-textual data is outsourced to the cloud server to reduce the …

Efficient privacy-preserving geographic keyword boolean range query over encrypted spatial data

Z Gong, J Li, Y Lin, J Wei, C Lancine - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
With the widespread popularity of mobile devices and geolocation-related services, spatial
keyword data has exploded in recent years. As an application, people are accustomed to …

Rphx: Result pattern hiding conjunctive query over private compressed index using Intel SGX

Q Jiang, EC Chang, Y Qi, S Qi, P Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Deploying data storage and query service in an untrusted cloud server raises critical privacy
and security concerns. This paper focuses on the fundamental problem of processing …

Privacy-preserving Boolean range query with temporal access control in mobile computing

Q Tong, X Li, Y Miao, X Liu, J Weng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With increasingly popular GPS-equipped mobile devices (eg, smartphones, tablets, laptops),
massive spatio-textual data has been outsourced to cloud servers for storage and analysis …

Fast, searchable, symmetric encryption scheme supporting ranked search

W He, Y Zhang, Y Li - Symmetry, 2022 - mdpi.com
Searchable encryption (SE) is one of the effective techniques for searching encrypted data
without decrypting it. This technique can provide a secure indexing mechanism for …

A performance tunable CPIR-based privacy protection method for location based service

J Zhang, C Li, B Wang - Information Sciences, 2022 - Elsevier
Location-based service has become one of the essential parts of our daily lives, which
raises a problem: how to preserve location privacy. Computational Private Information …

[PDF][PDF] 云计算环境下数据安全与隐私保护研究综述

邓桦, 宋甫元, 付玲, 欧露, 尹辉, 高毅… - 湖南大学学报(自然科学 …, 2022 - researchgate.net
用户数据安全与隐私保护是云计算环境中最重要的问题之一, 通常采用密码学技术保护数据安全
与隐私. 目前, 基于密码技术的数据安全查询, 分享以及差分隐私保护是国内外当前的研究热点 …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …