A privacy-preserving cross-media retrieval on encrypted data in cloud computing

Z Wang, J Qin, X Xiang, Y Tan, J Peng - Journal of Information Security and …, 2023 - Elsevier
Frequent cloud data breaches cause irreparable damage to cloud users and providers.
Cross-media retrieval can better leverage the value of data, but existing cross-media …

Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse

S Fugkeaw, L Hak, T Theeramunkong - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud data warehouse (CDW) platforms have been offered by many cloud service providers
to provide abundant storage and unlimited accessibility service to business users. Sensitive …

Assessing document sanitization for controlled information release and retrieval in data marketplaces

L Cassani, G Livraga, M Viviani - … of the Cross-Language Evaluation Forum …, 2024 - Springer
This study provides insights into both addressing data confidentiality concerns and
enhancing document retrieval effectiveness in Data Marketplaces, which in this specific …

Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems

F Tang, X Zhou, H Luo, P Wang, G Ling… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
In cloud-assisted electronic health (eHealth) systems, the exponential growth of electronic
health records (EHRs) has prompted healthcare organizations to move it to the cloud …

Time-conserving deduplicated data retrieval framework for the cloud computing environment

P Swathika, J Raja Sekar - Automatika: časopis za automatiku …, 2023 - hrcak.srce.hr
Sažetak Cloud computing technology is quite inevitable in today's smart world. The
excessive utilization of data mandates updated storage space, which is highly expensive …

Secure Fine-grained Multi-keyword Ciphertext Search Supporting Cloud-edge-end Collaboration in IoT

K ZHENG, Z ZHOU, J LIU, B YU - Chinese Journal of Electronics, 2024 - cje.ejournal.org.cn
The massive terminals access the Internet of Things (IoT) through edge nodes, bringing forth
new security and privacy challenges in ciphertext search and data sharing. Meanwhile …

[PDF][PDF] Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse

T THEERAMUNKONG - 2024 - researchgate.net
Cloud data warehouse (CDW) platforms have been offered by many cloud service providers
to provide abundant storage and unlimited accessibility service to business users. Sensitive …

Relaxed AVL trees with extra nodes

DE ZEGOUR - 2023 - researchsquare.com
A relaxation of AVL tree is proposed with no additional space. The original implementation
of AVL trees uses two additional bits per node to control the tree balance and only three …