Public Key Encryption with Keyword Search in Cloud: A Survey [PDF]
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users.
Yunhong Zhou +4 more
doaj +2 more sources
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
K. Rajesh Rao +4 more
doaj +5 more sources
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings [PDF]
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server.
Shuo Zhang +4 more
doaj +2 more sources
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks [PDF]
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu +5 more
doaj +2 more sources
Preeclampsia knowledge among postpartum women treated for preeclampsia and eclampsia at Korle Bu Teaching Hospital in Accra, Ghana [PDF]
Background Preeclampsia/eclampsia is a major cause of maternal morbidity and mortality worldwide, yet patients’ perspectives about their diagnosis are not well understood.
Avina Joshi +4 more
doaj +2 more sources
Surgical management of urinary stones with abnormal kidney anatomy [PDF]
In spite of the fact that urologic surgical techniques used by urologists are becoming more and more minimally invasive and easier because of developing technologies, surgical approaches for the urinary stones in kidneys with abnormal anatomy are still ...
Giray Ergin +5 more
doaj +2 more sources
Protein extract of kenaf seed exhibits anticoagulant, antiplatelet and antioxidant activities
Objective: To explore the anticoagulant, antiplatelet and antioxidant activities of protein extract of kenaf seed (PEKS). Methods: Sodium dodecyl sulphate polyacrylamide gel electrophoresis and reverse-phase high-performance liquid chromatography ...
Sujatha M Hanumegowda +8 more
doaj +1 more source
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack.
Koon-Ming Chan +3 more
doaj +1 more source
A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods
Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data.
M.H. Noorallahzade +2 more
doaj +1 more source
A PEKS-Based NDN Strategy for Name Privacy
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko +2 more
doaj +1 more source

