Privacy-preserving attribute-based keyword search in shared multi-owner setting

Y Miao, X Liu, KKR Choo, RH Deng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and
supports fine-grained access control over encrypted data in the cloud. However, prior CP …

Lightweight searchable encryption protocol for industrial internet of things

K Zhang, J Long, X Wang, HN Dai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IoT) has suffered from insufficient identity authentication and
dynamic network topology, thereby resulting in vulnerabilities to data confidentiality …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Practical attribute-based multi-keyword search scheme in mobile crowdsourcing

Y Miao, J Ma, X Liu, X Li, Z Liu… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Cloud-based mobile crowd-sourcing has been an attractive solution to provide data storage
and share services for resource-limited mobile devices in a privacy-preserving manner, but …

Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …

Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm

R Naresh, M Sayeekumar, GM Karthick, P Supraja - Soft Computing, 2019 - Springer
File storing as well as retrieving is the most important security-related research area in
cloud. Based on our literature survey, many researchers have developed several …

Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification

X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Verifiable Searchable Symmetric Encryption, as an important cloud security technique,
allows users to retrieve the encrypted data from the cloud through keywords and verify the …

Privacy-preserving fusion of IoT and big data for e-health

Y Yang, X Zheng, W Guo, X Liu, V Chang - Future Generation Computer …, 2018 - Elsevier
In this paper, we propose a privacy-preserving e-health system, which is a fusion of Internet-
of-things (IoT), big data and cloud storage. The medical IoT network monitors patient's …

Extended file hierarchy access control scheme with attribute-based encryption in cloud computing

J Li, N Chen, Y Zhang - IEEE Transactions on Emerging Topics …, 2019 - ieeexplore.ieee.org
In cloud computing, attribute based encryption (ABE) is often used to solve the challenging
issue in secure data storage. In order to lighten the burden of authority center, hierarchical …

MedShare: A privacy-preserving medical data sharing system by using blockchain

M Wang, Y Guo, C Zhang, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Electronic Health Record (EHR) and its privacy have attracted widespread attention with the
development of the healthcare industry in recent years. As locking medical data in a single …