A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

U Varri, S Pasupuleti, KV Kadambari - The Journal of Supercomputing, 2020 - Springer
With the emergence of cloud computing, data owners are showing interest to outsource the
data to the cloud servers and allowing the data users to access the data as and when …

A deep learning model for information loss prevention from multi-page digital documents

A Guha, D Samanta, A Banerjee, D Agarwal - IEEE Access, 2021 - ieeexplore.ieee.org
World Wide Web has redefined almost all the business models in the past twenty-five to
thirty years. IoT, Big Data, AI are some of the comparatively recent technologies which …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication

X Liu, T Lu, X He, X Yang, S Niu - IEEE Access, 2020 - ieeexplore.ieee.org
Searchable encryption is a promising technique that allows cloud service provider return the
interested files to the user, even if the shared files are encrypted. However, once encrypted …

Enabling traceable and verifiable multi-user forward secure searchable encryption in hybrid cloud

A Wu, A Yang, W Luo, J Wen - IEEE Transactions on Cloud …, 2022 - ieeexplore.ieee.org
Forward secure searchable encryption (FSSE) scheme allows one data user to search on
encrypted databases while resisting the file injection attack. The data utilization can be …

Searchable encryption with autonomous path delegation function and its application in healthcare cloud

Q Wang, C Lai, R Lu, D Zheng - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
Outsourcing medical data to healthcare cloud has become a popular trend. Since medical
data of patients contain sensitive personal information, they should be encrypted before …

A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive

VB Chenam, KD Sree, ST Ali - Peer-to-Peer Networking and Applications, 2024 - Springer
Cloud-based telemedicine uses powerful data processing technology to improve remote
healthcare services. This helps make healthcare more accessible, efficient, and beneficial …

A lattice-based searchable encryption scheme with the validity period control of files

E Zhang, Y Hou, G Li - Multimedia Tools and Applications, 2021 - Springer
In recent years, with the dramatic increase in the use of multimedia data, rapid retrieval and
sharing of the multimedia data have become major trends. The validity period control …

Blockchain-enabled one-to-many searchable encryption supporting designated server and multi-keywords for Cloud-IoMT

H Yu, S Liu, L Chen, Y Gao - Journal of Systems Architecture, 2024 - Elsevier
In smart wards, data generated by wearables and monitoring devices are periodically
transferred to the cloud server for long-term logging and subsequent access. Remote cloud …

Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice

X Yu, C Xu, L Xu, L Mei - Soft Computing, 2022 - Springer
To cope with the local storage stress that has resulted from the increase in data volumes and
to keep data privacy, users outsource their data to cloud servers after encrypting these data …