Results 311 to 320 of about 2,429,355 (361)
Some of the next articles are maybe not open access.
Achieving Searchable Encryption Scheme With Search Pattern Hidden
IEEE Transactions on Services Computing, 2022Searchable Encryption (SE) enables a data owner to outsource encrypted data to an untrusted server while preserving the keyword search functionality. Typically, the server learns whether or not a query has been performed more than once, which is usually ...
Yunling Wang+4 more
semanticscholar +1 more source
IEEE/CAA Journal of Automatica Sinica, 2021
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an encrypted form,
Mamta+5 more
semanticscholar +1 more source
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an encrypted form,
Mamta+5 more
semanticscholar +1 more source
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
IEEE Transactions on Dependable and Secure Computing, 2023We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE) where a data owner stores its encrypted documents on an untrusted remote server and wishes to selectively allow multiple users to access them by issuing keyword search ...
Javad Ghareh Chamani+4 more
semanticscholar +1 more source
IEEE Internet of Things Journal, 2022
Cloud storage and edge computing provide the possibility to address the tremendous storage and computing pressure caused by the explosive growth of traffic at the edge of the networks.
Jingwei Liu+6 more
semanticscholar +1 more source
Cloud storage and edge computing provide the possibility to address the tremendous storage and computing pressure caused by the explosive growth of traffic at the edge of the networks.
Jingwei Liu+6 more
semanticscholar +1 more source
A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment
IEEE Transactions on Network Science and Engineering, 2022Cloud server and fog computing have been utilized to manage enormous volumes of data with low service transmission time in Internet of Things (IoT) environment. However, untrustworthy relationships between network entities and cloud server cause a lot of
Jihye Oh+5 more
semanticscholar +1 more source
Searchable encryption through dispersion
2014 IEEE Central America and Panama Convention (CONCAPAN XXXIV), 2014Cryptography is the universal tool to protect the privacy of data. Today's cryptography still requires encrypted data to be decrypted before it can be searched. We propose here an alternative way of protecting the privacy of data through dispersion of a compressed version of the original data that can be searched without recovering the original data ...
Aiello, Carlos+2 more
openaire +4 more sources
IEEE Internet of Things Journal, 2023
In Internet of Things (IoT) application scenarios, such as intelligent logistics, secure data access control, and sharing based on dynamic searchable symmetric encryption (DSSE) has become a research hotspot in recent years.
Liqing Chen, Jiayi Li, Jiguo Li
semanticscholar +1 more source
In Internet of Things (IoT) application scenarios, such as intelligent logistics, secure data access control, and sharing based on dynamic searchable symmetric encryption (DSSE) has become a research hotspot in recent years.
Liqing Chen, Jiayi Li, Jiguo Li
semanticscholar +1 more source
Designated-ciphertext searchable encryption
Journal of Information Security and Applications, 2021Abstract Public-key encryption with keyword search (PEKS), proposed by Boneh et al. (2004), allows users to search encrypted keywords without losing data privacy. Although extensive studies have been conducted on this topic, only a few have focused on insider-keyword-guessing attacks (IKGA) that can reveal a user’s sensitive information.
Zi-Yuan Liu+3 more
openaire +3 more sources
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud
IEEE Transactions on Services Computing, 2022Dynamic symmetric searchable encryption (SSE), which enables a data user to securely search and dynamically update the encrypted documents stored in a semi-trusted cloud server, has received considerable attention in recent years. However, the search and
Yandong Zheng+4 more
semanticscholar +1 more source
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems
IEEE Systems Journal, 2022In the era of cloud computing, massive quantities of data are encrypted and uploaded to the cloud to realize a variety of applications and services while protecting user confidentiality.
Zi-Yuan Liu+4 more
semanticscholar +1 more source