Results 41 to 50 of about 31,005 (332)

A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments

open access: yesCryptography, 2022
Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources ...
Marius Iulian Mihailescu   +1 more
doaj   +1 more source

A practical and secure multi-keyword search method over encrypted cloud data [PDF]

open access: yes, 2013
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat   +5 more
core   +1 more source

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +1 more source

Tight Tradeoffs in Searchable Symmetric Encryption

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Asharov, Gilad, Segev, Gil, Shahaf, Ido
openaire   +1 more source

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment

open access: yesIEEE Access, 2019
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu   +3 more
doaj   +1 more source

SoK: Cryptographically Protected Database Search [PDF]

open access: yes, 2017
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K.   +8 more
core   +1 more source

Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]

open access: yes, 2017
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass   +7 more
core   +2 more sources

Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy

open access: yesProceedings on Privacy Enhancing Technologies, 2023
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its database (document sets) to an untrusted server and make searches and updates securely and efficiently.
Dandan Yuan   +3 more
semanticscholar   +1 more source

PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database

open access: yesInformatics in Medicine Unlocked, 2022
Privacy and security issues limit the query executions over genomics datasets, notably single nucleotide polymorphisms (SNPs), raised by the sensitivity of this type of data.
Sara Jafarbeiki   +7 more
doaj   +1 more source

HardIDX: Practical and Secure Index with SGX [PDF]

open access: yes, 2017
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva   +13 more
core   +2 more sources

Home - About - Disclaimer - Privacy