A review of functional encryption in IoT applications

K Shahzad, T Zia, EH Qazi - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …

Towards efficient content-aware search over encrypted outsourced data in cloud

Z Fu, X Sun, S Ji, G Xie - IEEE INFOCOM 2016-The 35th …, 2016 - ieeexplore.ieee.org
With the increasing adoption of cloud computing, a growing number of users outsource their
datasets into cloud. The datasets usually are encrypted before outsourcing to preserve the …

Semantic-aware searching over encrypted data for cloud computing

Z Fu, L Xia, X Sun, AX Liu, G Xie - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the increasing adoption of cloud computing, a growing number of users outsource their
datasets to cloud. To preserve privacy, the datasets are usually encrypted before …

An efficient ranked multi-keyword search for multiple data owners over encrypted cloud data

T Peng, Y Lin, X Yao, W Zhang - iEEE Access, 2018 - ieeexplore.ieee.org
With the development of cloud storage, more data owners are inclined to outsource their
data to cloud services. For privacy concerns, sensitive data should be encrypted before …

Catch you if you misbehave: Ranked keyword search results verification in cloud computing

W Zhang, Y Lin, G Qi - IEEE Transactions on Cloud Computing, 2015 - ieeexplore.ieee.org
With the advent of cloud computing, more and more people tend to outsource their data to
the cloud. As a fundamental data utilization, secure keyword search over encrypted cloud …

Semantic-aware multi-keyword ranked search scheme over encrypted cloud data

H Dai, X Dai, X Yi, G Yang, H Huang - Journal of Network and Computer …, 2019 - Elsevier
Traditional searchable encryption schemes mostly adopt the TF-IDF (term frequency-inverse
document frequency) model which ignores the semantic association between keywords and …

Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …

Approaches and challenges of privacy preserving search over encrypted data

DVNS Kumar, PS Thilagam - Information Systems, 2019 - Elsevier
More and more data owners are encouraged to outsource their data onto cloud servers for
reducing infrastructure, maintenance cost and also to get ubiquitous access to their stored …

A keyword-grouping inverted index based multi-keyword ranked search scheme over encrypted cloud data

H Dai, M Yang, G Yang, Y Xiang, Z Hu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the comprehensive development of cloud computing technology, more and more
enterprises and individuals tend to outsource computing, data, and other resources to the …

A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data

Q Zhou, H Dai, Y Liu, G Yang, X Yi, Z Hu - World Wide Web, 2023 - Springer
Most of the traditional privacy-preserving search schemes in cloud adopt TF-IDF model
which is on the basis of keyword frequency statistics. The embedding semantic association …