Results 1 to 10 of about 278 (215)

Towards efficient verifiable multi-keyword search over encrypted data based on blockchain [PDF]

open access: yesPeerJ Computer Science, 2022
Searchable symmetric encryption (SSE) provides an effective way to search encrypted data stored on untrusted servers. When the server is not trusted, it is indispensable to verify the results returned by it.
Wanshan Xu   +5 more
doaj   +3 more sources

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences, 2023
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +2 more sources

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT [PDF]

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +2 more sources

A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client. [PDF]

open access: yesPLoS ONE
Outsourcing data to remote cloud providers is becoming increasingly popular amongst organizations and individuals. A semi-trusted server uses Searchable Symmetric Encryption (SSE) to keep the search information under acceptable leakage levels whilst ...
Salim Sabah Bulbul   +6 more
doaj   +2 more sources

SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control

open access: yesCybersecurity
Sharing electronic protected health information (ePHI) is highly beneficial in public affairs. Constructing a cloud-assisted ePHI retrieval service represents a modern strategy that enhances cost-effectiveness and efficiency, making it a promising ...
Zhuobin Hu   +6 more
doaj   +2 more sources

Database Padding for Dynamic Symmetric Searchable Encryption [PDF]

open access: yesSecurity and Communication Networks, 2021
Dynamic symmetric searchable encryption (DSSE) that enables the search and update of encrypted databases outsourced to cloud servers has recently received widespread attention for leakage-abuse attacks against DSSE. In this paper, we propose a dynamic database padding method to mitigate the threat of data leakage during the update operation of ...
Ruizhong Du, Yuqing Zhang, Mingyue Li
openaire   +1 more source

Dynamic multi-keyword searchable encryption scheme

open access: yes网络与信息安全学报, 2023
Users of cloud storage often outsource their data to cloud servers to save local storage resources.However, cloud storage data is out of the user’s physical control, which may lead to malicious theft or disclosure of private data on cloud.At present ...
Chenghao YUAN, Yong LI, Shuang REN
doaj   +3 more sources

Dynamic Local Searchable Symmetric Encryption

open access: yes, 2022
In this article, we tackle for the first time the problem of dynamic memory-efficient Searchable Symmetric Encryption (SSE). In the term "memory-efficient" SSE, we encompass both the goals of local SSE, and page-efficient SSE. The centerpiece of our approach is a novel connection between those two goals.
Minaud, Brice, Reichle, Michael
openaire   +3 more sources

Shedding Light on Blind Spot of Backward Privacy in Dynamic Searchable Symmetric Encryption

open access: yesIEEE Access, 2023
Dynamic searchable symmetric encryption (DSSE) enables users to outsource their data while retaining the capability to search and update on the encrypted database. Although various DSSE schemes have been proposed to achieve higher efficiency and stronger
Hyundo Yoon   +5 more
doaj   +1 more source

Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes

open access: yesHigh-Confidence Computing, 2022
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy