Concisely Indexed Multi-Keyword Rank Search on Encrypted Cloud Documents
With the advent of cloud computing, the low-cost and high-capacity cloud storages have attracted people to move their data from local computers to the remote facilities.
Tai-Lin Chin, Wan-Ni Shih
doaj +1 more source
Ciphertext Fuzzy Search Scheme Based on Pinyin Similarity in Cloud Storage [PDF]
The Chinese keyword fuzzy ciphertext search scheme relies on a predefined keyword fuzzy set,which has higher search complexity and storage cost.A multi-keyword ciphertext fuzzy search scheme based on pinyin similarity in cloud storage is proposed.The ...
HUANG Baohua,L Qi,MO Jiawei
doaj +1 more source
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi +3 more
core +1 more source
Multi-Recipient encryption with keyword search without pairing for cloud storage
With the rapid development of cloud computing technology and communication technology, cloud storage has become a tool used by people in daily life. Cloud storage service enables users to outsource data to cloud servers and retrieve desired document ...
Ningbin Yang +3 more
doaj +1 more source
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W. +4 more
core +3 more sources
Verifiable multi-keyword search scheme based on improved Merkle-Tree authentication method
Aiming at the problem that the result verification method in the searchable encryption scheme was complicated,the search cost was high and the efficiency was low,it was difficult to meet the requirements of efficient verification and security of multi ...
Youliang TIAN, Qin LUO
doaj +2 more sources
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [PDF]
With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on ...
Ning Cao +4 more
openaire +1 more source
A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds
With the rapid development of cloud computing services, more and more individuals and enterprises prefer to outsource their data or computing to clouds.
Hua Dai +4 more
doaj +1 more source
A parallelized disjunctive query based searchable encryption scheme for big data [PDF]
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive ...
Rajarajan, M. +4 more
core +1 more source
Reverse spatial visual top-k query [PDF]
With the wide application of mobile Internet techniques an location-based services (LBS), massive multimedia data with geo-tags has been generated and collected.
Song, Jiayu +5 more
core +1 more source

