Results 31 to 40 of about 130,811 (179)

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds

open access: yesIEEE Access, 2020
With the rapid development of cloud computing services, more and more individuals and enterprises prefer to outsource their data or computing to clouds.
Hua Dai   +4 more
doaj   +1 more source

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?

open access: yesFuture Internet, 2023
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes.
Yiming Zhu   +4 more
doaj   +1 more source

Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network

open access: yesConnection Science, 2022
In an intelligent edge network, data owners encrypt data and outsource it to the edge servers to prevent the leakage of data and user information. It is a research issue to achieve efficient search and data update of the ciphertext stored in the edge ...
Xixi Yan   +3 more
doaj   +1 more source

Investigation of Relationship Between Google Cost-Per-Click and Search-Volume on Keyword of Chicago Tours

open access: yesJournal of Information Systems and Informatics, 2023
Pay-per-click is one of common and important ways in online advertising through Google; but some keywords are usually expensive and this issue is visible through Google cost-per-click in Google keyword planner tool.
Ramin Abolghasemi Komleh
doaj   +1 more source

Multi-Keyword search over encrypted data with scoring and search pattern obfuscation

open access: yesInternational Journal of Information Security, 2015
Search over encrypted data recently became a critical operation that raised a considerable amount of interest in both academia and industry. Especially, as outsourcing, sensitive data to cloud prove to be a strong trend to benefit from the unmatched storage and computing capacities thereof.
Örencik, Cengiz   +3 more
openaire   +3 more sources

Term-Specific Eigenvector-Centrality in Multi-Relation Networks [PDF]

open access: yes, 2011
Fuzzy matching and ranking are two information retrieval techniques widely used in web search. Their application to structured data, however, remains an open problem.
Bry, François   +3 more
core   +2 more sources

Multi-keyword Similarity Search over Encrypted Cloud Data [PDF]

open access: yes, 2014
Searchable encryption allows one to upload encrypted documents on a remote honest-but-curious server and query that data at the server itself without requiring the documents to be decrypted prior to searching. In this work, we propose a novel secure and efficient multi-keyword similarity searchable encryption (MKSim) that returns the matching data ...
Mikhail Strizhov, Indrajit Ray
openaire   +1 more source

Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search [PDF]

open access: yesIEEE Access, 2019
Searchable public key encryption (SPE) that supports multi-keywords search, allows data users to retrieve encrypted files of interest efficiently, and thus it has been intensively studied during recent years. However, most existing SPE solutions focus on the exact keyword matching, which fails to capture the semantic information of documents.
Yu Zhang, Yifan Wang, Yin Li
openaire   +2 more sources

Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System

open access: yesIEEE Access, 2019
With the rapid advance of the Internet of Things (IoT) and cloud computing technologies, the IoT-oriented health is expected to greatly improve the quality of healthcare service.
Jianfei Sun, Shengnan Hu, Xuyun Nie
doaj   +1 more source

Multi-keyword Fuzzy Search over Encrypted Cloud Storage Data

open access: yesProcedia Computer Science, 2021
Abstract With the rapid development of the cloud computing, more and more users choose to store their encrypted data on the cloud server. Searchable encryption (SE) schemes capacitate legal users to retrieve encrypted data in the cloud server and the cloud server does not leak sensitive information about the encrypted data.
Mengmeng Li   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy