SoK: Cryptographically Protected Database Search [PDF]
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K. +8 more
core +1 more source
A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan +2 more
core +1 more source
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C. +4 more
core +1 more source
PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database
Privacy and security issues limit the query executions over genomics datasets, notably single nucleotide polymorphisms (SNPs), raised by the sensitivity of this type of data.
Sara Jafarbeiki +7 more
doaj +1 more source
Storage Efficient Substring Searchable Symmetric Encryption [PDF]
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achieve efficient substring search on the server side, the cost at the user side may be prohibitive.
Iraklis Leontiadis, Ming Li
openaire +1 more source
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass +7 more
core +2 more sources
RNA Sequencing Resolves Cryptic Pathogenic Variants in Mitochondrial Disease
ABSTRACT Objective Mitochondrial diseases are the most common inherited metabolic disorders, characterized by pronounced clinical and genetic heterogeneity that complicates molecular diagnosis. Although DNA‐based sequencing approaches have become standard in genetic testing, up to half of patients remain without a definitive diagnosis.
Zhimei Liu +21 more
wiley +1 more source
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control [PDF]
Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers.
Chen, Xiaofeng +5 more
core +2 more sources
A chiral photodetector capable of selectively distinguishing left‐ and right‐handed circularly polarized light is experimentally demonstrated. The device, which features a nanopatterned electrode inverse‐designed by a genetic algorithm within a metal–dielectric–metal nanocavity that incorporates a vacuum‐deposited small‐molecule multilayer, exhibits ...
Kyung Ryoul Park +3 more
wiley +1 more source
Dynamic Searchable Symmetric Encryption Based on Protected Search Mode of Updatable Encryption [PDF]
Dynamic searchable symmetric encryption(DSSE) technology,as an extension of static searchable encryption,has attracted much attention because it solves the problem of secure retrieval over encrypted data and supports data dynamicity.For practicality ...
XU Chengzhi, XU Lei, XU Chungen
doaj +1 more source

