Results 31 to 40 of about 377,078 (197)

Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents

open access: yesApplied Sciences, 2021
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj   +1 more source

Ciphertext Fuzzy Search Scheme Based on Pinyin Similarity in Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2019
The Chinese keyword fuzzy ciphertext search scheme relies on a predefined keyword fuzzy set,which has higher search complexity and storage cost.A multi-keyword ciphertext fuzzy search scheme based on pinyin similarity in cloud storage is proposed.The ...
HUANG Baohua,L Qi,MO Jiawei
doaj   +1 more source

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]

open access: yes, 2014
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi   +3 more
core   +1 more source

Multi-Recipient encryption with keyword search without pairing for cloud storage

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang   +3 more
doaj   +1 more source

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method

open access: yesTongxin xuebao, 2020
Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi ...
Youliang TIAN, Qin LUO
doaj   +2 more sources

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [PDF]

open access: yesIEEE Transactions on Parallel and Distributed Systems, 2011
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on ...
Ning Cao   +4 more
openaire   +1 more source

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds

open access: yesIEEE Access, 2020
With the rapid development of cloud computing services, more and more individuals and enterprises prefer to outsource their data or computing to clouds.
Hua Dai   +4 more
doaj   +1 more source

A parallelized disjunctive query based searchable encryption scheme for big data [PDF]

open access: yes, 2018
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive ...
Rajarajan, M.   +4 more
core   +1 more source

Reverse spatial visual top-k query [PDF]

open access: yes, 2020
With the wide application of mobile Internet techniques an location-based services (LBS), massive multimedia data with geo-tags has been generated and collected.
Song, Jiayu   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy