Results 21 to 30 of about 377,078 (197)

Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing

open access: yesSecur. Commun. Networks, 2021
-e emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage.
Zhenwei Chen   +4 more
semanticscholar   +1 more source

Multi-Keyword Searchable Encryption Scheme Supporting Attribute Revocation in Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2021
The convenience and efficiency of cloud storage make more and more users choose to store data in cloud.In order to support users to retrieve encrypted data in cloud,a multi keyword search scheme based on attribute encryption supporting attribute ...
HUANG Baohua, HUANG Pirong, ZHAO Weihong, PENG Li
doaj   +1 more source

Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data

open access: yesIEEE Access, 2023
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized.
Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang
doaj   +1 more source

Multi-keyword sponsored search [PDF]

open access: yesProceedings of the 12th ACM conference on Electronic commerce, 2011
We investigate search engines' mechanism for allocating impressions generated from different search terms. This mechanism is equivalent to running an independent GSP auction for each search term only when the number of search terms is small. In practice, the number of search terms is so large that an advertiser cannot possibly communicate to the search
openaire   +1 more source

Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration

open access: yesTongxin xuebao, 2022
To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi ...
Xiaodong YANG   +4 more
doaj   +2 more sources

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

open access: yesIEEE Access, 2019
In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their data with access policy for security consideration, and encrypt keywords to obtain keyword index for privacy keyword search, and data users can search interesting ...
Shangping Wang, Shasha Jia, Yaling Zhang
doaj   +1 more source

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks

open access: yesSecur. Commun. Networks, 2021
Wireless body area network (WBAN) consists of a number of sensors that are worn on patients to collect dynamic e-health records (EHRs) and mobile devices that aggregate EHRs.
Yong Ding   +4 more
semanticscholar   +1 more source

Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]

open access: yes, 2012
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz   +3 more
core   +1 more source

Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [PDF]

open access: yesJisuanji kexue, 2022
The convenience and efficiency of cloud computing have brought great potential for its development.More and more enterprises and individuals obtain real benefits by using various outsourcing services provided by cloud computing.In order to protect the ...
ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng
doaj   +1 more source

Split keyword fuzzy and synonym search over encrypted cloud data [PDF]

open access: yes, 2017
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R.   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy