A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system

J Liu, Y Fan, R Sun, L Liu, C Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Due to the massive applications of Internet of Things (IoT) and the prevalence of wearable
devices, e-healthcare systems are widely deployed in medical institutions. As a significant …

Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture

H Wu, B Düdder, L Wang, Z Cao, J Zhou… - ACM Computing …, 2023 - dl.acm.org
Secure keyword search is a prevailing search service offered in outsourced environments.
However, with the increasingly severe security vulnerabilities of conventional centralized …

Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud

Y Miao, F Li, X Li, Z Liu, J Ning, H Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Electronic health (e-health) systems may outsource data such as patient e-health records to
mobile cloud servers for efficiency gains (eg, minimizing local storage and computation …

Designing attribute-based verifiable data storage and retrieval scheme in cloud computing environment

S Bera, S Prasad, YS Rao, AK Das, Y Park - Journal of Information Security …, 2023 - Elsevier
The cloud computing technology is a novel storage and computing paradigm that enables
individuals and organizations to store data, share data with intended group of users and …

Be-trdss: Blockchain-enabled secure and efficient traceable-revocable data-sharing scheme in industrial internet of things

R Ma, L Zhang, Q Wu, Y Mu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As an important component of the Industrial Internet of Things (IIoT), the smart factory uses
IIoT and equipment-monitoring technology to collect data to reasonably arrange the …

Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing

Y Zou, T Peng, G Wang, E Luo, J Xiong - Journal of Systems Architecture, 2023 - Elsevier
Cloud-based data sharing has become a significant technology trend thanks for its
convenience and economy. Data owners are suggested to encrypt data before outsourcing …

Fast and privacy-preserving attribute-based keyword search in cloud document services

Q Huang, Q Wei, G Yan, L Zou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Currently, various encryption techniques have been employed to protect the documents in
cloud storage. In particular, attribute-based keyword search (ABKS) is a practical encryption …

Designing Secure Data Storage and Retrieval Scheme in Cloud-Assisted Internet-of-Drones Environment

S Prasad, YS Rao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Internet-of-Drones (IoD) is an emerging network connecting various physical devices,
namely drones, flying area station servers (FASs), controlling authority and cloud, through …

Single-server public-key authenticated encryption with keyword search and its application in IIoT

X Zhou, D He, J Ning, M Luo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Industrial Internet of Things (IIoT) gathers and analyzes multiple types of
data (such as ambient and mechanical data) from physical devices to improve intelligent …