Results 51 to 60 of about 2,429,355 (361)
Efficient certificateless searchable encryption scheme with verifiability
Searchable encryption offers an effective way to achieve data privacy protection and keyword search in cloud computing environments.Currently, the existing schemes not only lack dynamic update and efficient verification mechanism, but also suffer from ...
Xinhua CUI, Youliang TIAN, Qijia ZHANG
doaj +2 more sources
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.+4 more
core +3 more sources
A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
Outsourcing data to cloud services is a good solution for users with limited computing resources. Privacy and confidentiality of data is jeopardized when data is transferred and shared in the cloud.
Haorui Du+4 more
semanticscholar +1 more source
SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K.+8 more
core +1 more source
Secure searchable encryption: a survey [PDF]
Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate the burden of local storage. However, storing sensitive data on remote servers poses privacy challenges and is currently a source of concern.
Yunling Wang+3 more
openaire +2 more sources
Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources ...
M. Mihailescu, S. Nita
semanticscholar +1 more source
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat+5 more
core +1 more source
Searchable Encryption In Cloud Storage
{"references": ["D. Song, D. Wagner, and A. Perrig, \"Practical Techniques for Searches on Encrypted Data,\" in Proceedings of IEEE Symposium on Security and Privacy'00, 2000, pp. 44-55.", "E.-J. Goh, \"Secure Indexes,\" Cryptology ePrint Archive, 2003, [Online]. Available: http://eprint.iacr.org/2003/216.", "Y.-C. Chang and M.
Ren Junn Hwang+2 more
openaire +2 more sources
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy
—In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that previous search queries cannot be associated with future updates, while backward privacy guarantees that subsequent search queries cannot be associated with deleted ...
Shifeng Sun+7 more
semanticscholar +1 more source
A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption [PDF]
Cloud Service Providers, such as Google Cloud Platform, Microsoft Azure, or Amazon Web Services, offer continuously evolving cloud services. It is a growing industry. Businesses, such as Netflix and PayPal, rely on the Cloud for data storage, computing power, and other services.
arxiv