Blockchain-assisted searchable attribute-based encryption for e-health systems

X Xiang, X Zhao - Journal of Systems Architecture, 2022 - Elsevier
Abstract The Internet of Things (IoT) is becoming increasingly popular for transmitting
massive data in a network. With a limited supply of IoT devices, utilizing cloud storage is …

A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments

U Varri, S Pasupuleti, KV Kadambari - The Journal of Supercomputing, 2020 - Springer
With the emergence of cloud computing, data owners are showing interest to outsource the
data to the cloud servers and allowing the data users to access the data as and when …

A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA

VB Chenam, ST Ali - Computer Standards & Interfaces, 2022 - Elsevier
With the massive growth of the World Wide Web (ie, internet), individual users or companies
can store and manage large amounts of sensitive data to outsource it to the cloud server …

Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting

DN Wu, QQ Gan, XM Wang - IEEE Access, 2018 - ieeexplore.ieee.org
Data security and privacy concerns are important issues in cloud storage. In this paper, we
propose a verifiable public key encryption with keyword search based on homomorphic …

Forward secure public-key authenticated encryption with conjunctive keyword search

Z Jiang, K Zhang, L Wang, J Ning - The Computer Journal, 2023 - academic.oup.com
Public key encryption with keyword search is a promising primitive which enables search
over encrypted data in secure data outsourcing services. In traditional construction, the …

Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine

M Ma, S Fan, D Feng - Journal of Information Security and Applications, 2020 - Elsevier
With the development of communication and information technologies, the telemedicine
system has infiltrated many aspects of medicine field. It allows doctors to simultaneously …

An efficient verifiable searchable encryption scheme with aggregating authorization for blockchain-enabled IoT

T Wang, J Wang, Q Yang, B Yang, H Li… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Blockchain-enabled Internet of Things (IoT) provides a secure sharing of data and resources
to the various miners of the IoT network, removes centralized control, and can overcome part …

A blockchain-based traceability system with efficient search and query

C Lai, Y Wang, H Wang, D Zheng - Peer-to-Peer Networking and …, 2023 - Springer
With the emerging of blockchain technology, new technical solutions are available for
secure storage and trusted computing in the data traceability. However, there are a number …

VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data

Y Liang, Y Li, Q Cao, F Ren - Journal of Systems Architecture, 2020 - Elsevier
With fast development of cloud storage, people increasingly outsource their files to the cloud
server. To protect the confidentiality of outsourced files, files often are encrypted before …

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

M Zarezadeh, H Mala, M Ashouri-Talouki - Peer-to-Peer Networking and …, 2020 - Springer
With the advent of cloud computing, data owners are motivated to outsource their data to
public clouds for decreasing the cost of management systems. For protecting data privacy …