Results 21 to 30 of about 3,048 (208)

Encrypted Shared Data Spaces [PDF]

open access: yes, 2008
The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content.
A. Wood   +13 more
core   +2 more sources

A practical and secure multi-keyword search method over encrypted cloud data [PDF]

open access: yes, 2013
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat   +5 more
core   +1 more source

A Survey on Searchable Symmetric Encryption

open access: yesACM Computing Surveys, 2023
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (
Feng Li   +5 more
openaire   +2 more sources

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Forward Secure Conjunctive-Keyword Searchable Encryption

open access: yesIEEE Access, 2019
Searchable symmetric encryption (SSE) has been applied in constructing secure cloud storage for its simplicity, high-efficiency, and practicality. Recent works show that forward privacy has become a fundamental property required for SSE, and several ...
Chengyu Hu   +6 more
doaj   +1 more source

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +3 more sources

Tight Tradeoffs in Searchable Symmetric Encryption

open access: yesJournal of Cryptology, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Asharov, Gilad, Segev, Gil, Shahaf, Ido
openaire   +1 more source

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment

open access: yesIEEE Access, 2019
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu   +3 more
doaj   +1 more source

Shared and Searchable Encrypted Data for Untrusted Servers [PDF]

open access: yes, 2008
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +3 more sources

SoK: Cryptographically Protected Database Search [PDF]

open access: yes, 2017
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K.   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy