Results 41 to 50 of about 31,005 (332)
Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources ...
Marius Iulian Mihailescu +1 more
doaj +1 more source
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source
Forward Secure Conjunctive-Keyword Searchable Encryption
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu +6 more
doaj +1 more source
Tight Tradeoffs in Searchable Symmetric Encryption
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Asharov, Gilad, Segev, Gil, Shahaf, Ido
openaire +1 more source
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu +3 more
doaj +1 more source
SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K. +8 more
core +1 more source
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass +7 more
core +2 more sources
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy
Dynamic searchable symmetric encryption (DSSE) enables the data owner to outsource its database (document sets) to an untrusted server and make searches and updates securely and efficiently.
Dandan Yuan +3 more
semanticscholar +1 more source
PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database
Privacy and security issues limit the query executions over genomics datasets, notably single nucleotide polymorphisms (SNPs), raised by the sensitivity of this type of data.
Sara Jafarbeiki +7 more
doaj +1 more source
HardIDX: Practical and Secure Index with SGX [PDF]
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance. Existing hardware-based approaches do not scale well due to hardware limitations and software designs that
A Boldyreva +13 more
core +2 more sources

