Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification

X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Verifiable Searchable Symmetric Encryption, as an important cloud security technique,
allows users to retrieve the encrypted data from the cloud through keywords and verify the …

Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing

Q Liu, Y Peng, J Wu, T Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the ever-increasing amount of data resided in a cloud, how to provide users with secure
and practical query services has become the key to improve the quality of cloud services …

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data

X Jiang, J Yu, J Yan, R Hao - Information Sciences, 2017 - Elsevier
With the prevalence of the cloud computing, data owners can outsource their data to the
cloud server to enjoy convenient services. To ensure the user's data confidentiality, the …

Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption

C Guo, X Chen, Y Jie, Z Fu, M Li… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
As cloud computing becomes prevalent, more and more data owners are likely to outsource
their data to a cloud server. However, to ensure privacy, the data should be encrypted before …

Privacy-Preserving Multi-Keyword Top- Similarity Search Over Encrypted Data

X Ding, P Liu, H Jin - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
Cloud computing provides individuals and enterprises massive computing power and
scalable storage capacities to support a variety of big data applications in domains like …

Towards trustworthy and private keyword search in encrypted decentralized storage

C Cai, X Yuan, C Wang - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
Emerging decentralized storage services such as Storj and Filecoin show promise as a new
paradigm for data outsourcing. These services tie cryptocurrency to personal storage …

Efficient and privacy-preserving similarity query with access control in eHealthcare

Y Zheng, R Lu, Y Guan, S Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Similarity queries, giving a way to disease diagnosis based on similar patients, have wide
applications in eHealthcare and are essentially demanded to be processed under fine …

Hardening database padding for searchable encryption

L Xu, X Yuan, C Wang, Q Wang… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
Searchable encryption (SE) is a practical crypto-graphic primitive to build encrypted
databases. Recently there has been much attention in leakage-abuse attacks against SE …

Achieving efficient and privacy-preserving exact set similarity search over encrypted data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …

Towards private similarity query based healthcare monitoring over digital twin cloud platform

Y Zheng, R Lu, Y Guan, S Zhang… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
As the growing proportion of aging population, the demand for sustainable, high quality, and
timely healthcare services has become increasingly pressing, especially since the outbreak …