A secure and efficient DSSE scheme with constant storage costs in smart devices
With the continuous development of the Internet of Things (IOT) and cloud computing, smart devices are playing an increasingly important role in users’ daily life.
Weiwei Yan, Sai Ji
doaj +1 more source
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass +7 more
core +2 more sources
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C. +4 more
core +1 more source
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness
Haochen Dou +6 more
openaire +3 more sources
Forward Secure Conjunctive-Keyword Searchable Encryption
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu +6 more
doaj +1 more source
SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K. +8 more
core +1 more source
Distributed Searchable Symmetric Encryption [PDF]
Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and retrieve the data selectively without the storage provider learning the contents of the data or the ...
Bösch, Christoph +7 more
core +4 more sources
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W. +4 more
core +3 more sources
Efficient searchable symmetric encryption for storing multiple source data on cloud [PDF]
© 2015 IEEE. Cloud computing has greatly facilitated large-scale data outsourcing due to its cost efficiency, scalability and many other advantages. Subsequent privacy risks force data owners to encrypt sensitive data, hence making the outsourced data no
Chen, J, Liu, C, Zhu, L
core +2 more sources
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael +2 more
core +2 more sources

