Blocking and filtering techniques for entity resolution: A survey

G Papadakis, D Skoutas, E Thanos… - ACM Computing Surveys …, 2020 - dl.acm.org
Entity Resolution (ER), a core task of Data Integration, detects different entity profiles that
correspond to the same real-world object. Due to its inherently quadratic complexity, a series …

A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

U Varri, S Pasupuleti, KV Kadambari - The Journal of Supercomputing, 2020 - Springer
With the emergence of cloud computing, data owners are showing interest to outsource the
data to the cloud servers and allowing the data users to access the data as and when …

Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing

Q Liu, Y Peng, J Wu, T Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the ever-increasing amount of data resided in a cloud, how to provide users with secure
and practical query services has become the key to improve the quality of cloud services …

PriRadar: A privacy-preserving framework for spatial crowdsourcing

D Yuan, Q Li, G Li, Q Wang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Privacy leakage is a serious issue in spatial crowdsourcing in various scenarios. In this
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …

Secure fine-grained encrypted keyword search for e-healthcare cloud

H Wang, J Ning, X Huang, G Wei… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
E-Healthcare systems are increasingly popular due to the introduction of wearable
healthcare devices and sensors. Personal health records (PHRs) are collected by these …

Lattice-based public key searchable encryption with fine-grained access control for edge computing

P Wang, B Chen, T Xiang, Z Wang - Future Generation Computer Systems, 2022 - Elsevier
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices,
edge computing provides various on-demand data services to reduce latency and network …

Hardening database padding for searchable encryption

L Xu, X Yuan, C Wang, Q Wang… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
Searchable encryption (SE) is a practical crypto-graphic primitive to build encrypted
databases. Recently there has been much attention in leakage-abuse attacks against SE …

Achieving efficient and privacy-preserving exact set similarity search over encrypted data

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …

Building a dynamic searchable encrypted medical database for multi-client

L Xu, C Xu, JK Liu, C Zuo, P Zhang - Information Sciences, 2020 - Elsevier
E-medical record is an emerging health information exchange model based on cloud
computing. As cloud computing allows companies and individuals to outsource their data …

Efficient privacy-preserving similarity range query with quadsector tree in ehealthcare

Y Zheng, R Lu, Y Guan, J Shao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a consequence of advance in the Internet of Things (IoT) and big data technology, smart
eHealthcare has emerged and greatly enabled patients to enjoy high-quality healthcare …