Results 21 to 30 of about 2,429,355 (361)
A study on searchable encryption schemes
To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. Since the remote servers are untrusted party, the data has to be encrypted to achieve security and privacy. But encryption and decryption causes communication overhead for many data utilization operations like searching and ...
Sunitha Buchade, Prakash R. Devale
openaire +4 more sources
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents [PDF]
Cloud data storage solutions offer customers cost-effective and reduced data management. While attractive, data security issues remain to be a core concern.
Marc Damie, Florian Hahn, Andreas Peter
semanticscholar +1 more source
An Efficient and Secure Location-based Alert Protocol using Searchable Encryption and Huffman Codes
Shaham S, Ghinita G, Shahabi C.
europepmc +3 more sources
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
We study encrypted storage schemes where a client outsources data to an untrusted third-party server (such as a cloud storage provider) while maintaining the ability to privately query and dynamically update the data.
Ghous Amjad+4 more
semanticscholar +1 more source
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan+5 more
semanticscholar +1 more source
Searchable encryption is an important cryptographic technique that achieves data security and keyword retrieval over encrypted data in cloud. In 2004, Boneh et.al proposed the first searchable encryption scheme based on asymmetric cryptography.
Lidong Han+4 more
doaj +1 more source
Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham+6 more
doaj +1 more source
Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj +3 more sources
Registered Keyword Searchable Encryption Based on SM9
The SM9 algorithm is an Identity-Based Encryption (IBE) algorithm independently made by China. The existing SM9 searchable encryption scheme cannot be effective against insider keyword guessing attacks and violates users’ data privacy.
Haoyu Zhang, Baodong Qin, Dong Zheng
doaj +1 more source
A Searchable Encryption with Forward/Backward Security and Constant Storage
Dynamic searchable encryption satisfies users’ needs for ciphertext retrieval on semi-trusted servers, while allowing users to update server-side data.
Suzhen Cao+3 more
doaj +1 more source