Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis

I Amorim, I Costa - Mathematics, 2023 - mdpi.com
The widespread adoption of cloud infrastructures has revolutionized data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data. To …

A systematic literature review on sensitive data protection in blockchain applications

S Khanum, K Mustafa - Concurrency and Computation …, 2023 - Wiley Online Library
Since inception, blockchain has earned significant attention due to its exclusive
characteristics and advantages. It has changed the way the transactions are conducted by …

Analysis of security and privacy issues of information management of big data in B2B based healthcare systems

BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H Xiong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …

A searchable encryption scheme with biometric authentication and authorization for cloud environments

MI Mihailescu, SL Nita - Cryptography, 2022 - mdpi.com
Cloud computing offers the possibility of providing suitable access within a network for a set
of resources. Many users use different services for outsourcing their data within the cloud …

A review of functional encryption in IoT applications

K Shahzad, T Zia, EH Qazi - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …

Public key encryption with keyword search in cloud: a survey

Y Zhou, N Li, Y Tian, D An, L Wang - Entropy, 2020 - mdpi.com
With the popularization of cloud computing, many business and individuals prefer to
outsource their data to cloud in encrypted form to protect data confidentiality. However, how …

Searchable encryption: A survey

D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …

Privacy‐Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario

B Wu, X Chen, Z Wu, Z Zhao, Z Mei… - … and Mobile Computing, 2021 - Wiley Online Library
The arrival of cloud computing age makes data outsourcing an important and convenient
application. More and more individuals and organizations outsource large amounts of graph …

A survey on public key encryption with keyword search: Taxonomy and methods

MH Noorallahzade, R Alimoradi… - International Journal of …, 2022 - Wiley Online Library
Given the many benefits that cloud computing brings, organizations tend to outsource most
of their data to reduce a large portion of their costs, but concern about the privacy of data is a …