A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data [PDF]
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud. However, while encryption provides confidentiality to data, it also sacrifices the data owners' ability ...
Li, Jiangnan+2 more
arxiv +5 more sources
Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version) [PDF]
Searchable encryption is a technique that allows a client to store data in encrypted form on a curious server, such that data can be retrieved while leaking a minimal amount of information to the server.
Doumen, J.M.+3 more
core +21 more sources
Homomorphic Encryption: An Analysis of its Applications in Searchable Encryption [PDF]
The widespread adoption of cloud infrastructures has revolutionised data storage and access. However, it has also raised concerns regarding the privacy of sensitive data stored in the cloud. To address these concerns, encryption techniques have been widely used.
Ivone Amorim, Iva Costa
arxiv +3 more sources
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. [PDF]
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other.
Ali A+7 more
europepmc +2 more sources
Rethinking Searchable Symmetric Encryption
ISBN:978-1-6654-9336 ...
Gui, Zichen+2 more
openaire +3 more sources
A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing [PDF]
Cloud computing is a popular distributed network and utility model based technology. Since in cloud the data is outsourced to third parties, the protection of confidentiality and privacy of user data becomes important. Different methods for securing the data in cloud have been proposed by researchers including but not limited to Oblivious RAM ...
B T Prasanna, C. B. Akki
arxiv +3 more sources
Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang+2 more
doaj +2 more sources
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption [PDF]
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studies a new and practical security risk to DSSE, namely, secret key compromise (e.g., a user's secret key is leaked or stolen), which ...
Tianyang Chen+6 more
arxiv +3 more sources
Certificateless Searchable Encryption Scheme in Multi-User Environment [PDF]
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj +2 more sources
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods [PDF]
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud.
Guangchun Luo+3 more
doaj +2 more sources