Results 51 to 60 of about 10,393 (185)
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti +2 more
doaj
Privacy-preserving targeted advertising scheme for IPTV using the cloud [PDF]
In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud
Javid Khayati, Leyli +6 more
core +2 more sources
Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts.
Chen Shen, Yang Lu, Jiguo Li
doaj +1 more source
Server-Aided Public Key Encryption With Keyword Search
Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is against the data privacy of users.
Rongmao Chen +6 more
openaire +2 more sources
A time-aware searchable encryption scheme for EHRs
Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission.
Yousheng Zhou +4 more
doaj +1 more source
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments [PDF]
The enforcement of security policies in outsourced environments is still an open challenge for policy-based systems. On the one hand, taking the appropriate security decision requires access to the policies.
Asghar, Muhammad Rizwan +3 more
core +1 more source
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms.
Lifeng Guo +3 more
doaj +1 more source
An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme
Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context, Public Key Encryption with Keyword Search (PEKS) allows data users to perform keyword-based ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
Public key encryption with disjunctive keyword search (PEDK) is a public key encryption scheme that allows disjunctive keyword search over encrypted data without decryption.
Yu Zhang, Yin Li, Yifan Wang
doaj +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source

