Results 21 to 30 of about 27,872 (320)

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing

open access: yesSensors, 2018
Edge computing is an extension of cloud computing that enables messages to be acquired and processed at low cost. Many terminal devices are being deployed in the edge network to sense and deal with the massive data.
Kai Fan   +4 more
doaj   +1 more source

A practical and secure multi-keyword search method over encrypted cloud data [PDF]

open access: yes, 2013
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat   +5 more
core   +1 more source

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

open access: yesFuture Internet, 2023
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu   +4 more
doaj   +1 more source

Split keyword fuzzy and synonym search over encrypted cloud data [PDF]

open access: yes, 2017
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R.   +6 more
core   +1 more source

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Privacy-preserving targeted advertising scheme for IPTV using the cloud [PDF]

open access: yes, 2012
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud
Javid Khayati, Leyli   +6 more
core   +2 more sources

Keyword-Enhanced Multi-Expert Framework for Hate Speech Detection

open access: yesMathematics, 2022
The proliferation of hate speech on the Internet is harmful to the psychological health of individuals and society. Thus, establishing and supporting the development of hate speech detection and deploying evasion techniques is a vital task.
Weiyu Zhong   +4 more
doaj   +1 more source

Multi-Recipient encryption with keyword search without pairing for cloud storage

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang   +3 more
doaj   +1 more source

A parallelized disjunctive query based searchable encryption scheme for big data [PDF]

open access: yes, 2018
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive ...
Rajarajan, M.   +4 more
core   +1 more source

IGSK: Index Generation on Split Keyword for search over cloud data [PDF]

open access: yes, 2015
Storage as a Service (Saas) of cloud computing has become an alternative option for data owners of various organizations to store their data into the cloud. Usually sensitive data is encrypted to achieve data security and then it is outsourced into cloud.
Geetaa, C.M.   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy