Results 21 to 30 of about 130,811 (179)

Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents

open access: yesApplied Sciences, 2021
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj   +1 more source

Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]

open access: yes, 2012
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz   +3 more
core   +1 more source

Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [PDF]

open access: yesJisuanji kexue, 2022
The convenience and efficiency of cloud computing have brought great potential for its development.More and more enterprises and individuals obtain real benefits by using various outsourcing services provided by cloud computing.In order to protect the ...
ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng
doaj   +1 more source

Ciphertext Fuzzy Search Scheme Based on Pinyin Similarity in Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2019
The Chinese keyword fuzzy ciphertext search scheme relies on a predefined keyword fuzzy set,which has higher search complexity and storage cost.A multi-keyword ciphertext fuzzy search scheme based on pinyin similarity in cloud storage is proposed.The ...
HUANG Baohua,L Qi,MO Jiawei
doaj   +1 more source

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]

open access: yes, 2014
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi   +3 more
core   +1 more source

A parallelized disjunctive query based searchable encryption scheme for big data [PDF]

open access: yes, 2018
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive ...
Rajarajan, M.   +4 more
core   +1 more source

Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method

open access: yesTongxin xuebao, 2020
Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi ...
Youliang TIAN, Qin LUO
doaj   +2 more sources

Multi-Recipient encryption with keyword search without pairing for cloud storage

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang   +3 more
doaj   +1 more source

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [PDF]

open access: yesIEEE Transactions on Parallel and Distributed Systems, 2011
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on ...
Ning Cao   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy