Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment
In traditional cloud computing system, searchable encryption is deemed as a core technology to realize data confidentiality protection and information retrieval functions.
Yang Yang +5 more
doaj +3 more sources
An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
With the development of cloud storage, more data owners are inclined to outsource their data to cloud services. For privacy concerns, sensitive data should be encrypted before outsourcing.
Tianyue Peng +3 more
doaj +3 more sources
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used.
Ivone Amorim, Ivan Costa
doaj +1 more source
Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents [PDF]
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities. People can access and share their data with others at anytime, from anywhere. However, the convenience of cloud storages also comes with new problems and challenges.
Tai-Lin Chin, Wan-Ni Shih
openaire +2 more sources
Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System
With the rapid advance of the Internet of Things (IoT) and cloud computing technologies, the IoT-oriented health is expected to greatly improve the quality of healthcare service.
Jianfei Sun, Shengnan Hu, Xuyun Nie
doaj +1 more source
Split keyword fuzzy and synonym search over encrypted cloud data [PDF]
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R. +6 more
core +1 more source
Multi Keyword Search on Encrypted Data with Ranking
To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As a consequence, it is important to establish efficient and precise cypher text search techniques. One issue would be that the connection between documents is typically obscured during the encryption process, resulting in a significant deterioration of search
openaire +1 more source
Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz +3 more
core +1 more source
Term-Specific Eigenvector-Centrality in Multi-Relation Networks [PDF]
Fuzzy matching and ranking are two information retrieval techniques widely used in web search. Their application to structured data, however, remains an open problem.
Bry, François +3 more
core +2 more sources
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source

