EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing
Edge computing is an extension of cloud computing that enables messages to be acquired and processed at low cost. Many terminal devices are being deployed in the edge network to sense and deal with the massive data.
Kai Fan +4 more
doaj +1 more source
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu +4 more
doaj +1 more source
Split keyword fuzzy and synonym search over encrypted cloud data [PDF]
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R. +6 more
core +1 more source
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W. +4 more
core +3 more sources
Privacy-preserving targeted advertising scheme for IPTV using the cloud [PDF]
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud
Javid Khayati, Leyli +6 more
core +2 more sources
Keyword-Enhanced Multi-Expert Framework for Hate Speech Detection
The proliferation of hate speech on the Internet is harmful to the psychological health of individuals and society. Thus, establishing and supporting the development of hate speech detection and deploying evasion techniques is a vital task.
Weiyu Zhong +4 more
doaj +1 more source
Multi-Recipient encryption with keyword search without pairing for cloud storage
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang +3 more
doaj +1 more source
A parallelized disjunctive query based searchable encryption scheme for big data [PDF]
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive ...
Rajarajan, M. +4 more
core +1 more source
IGSK: Index Generation on Split Keyword for search over cloud data [PDF]
Storage as a Service (Saas) of cloud computing has become an alternative option for data owners of various organizations to store their data into the cloud. Usually sensitive data is encrypted to achieve data security and then it is outsourced into cloud.
Geetaa, C.M. +5 more
core +1 more source

