[go: up one dir, main page]

Su et al., 2019 - Google Patents

Efficient verifiable multi-key searchable encryption in cloud computing

Su et al., 2019

View PDF
Document ID
13245883782823751193
Author
Su Y
Wang J
Wang Y
Miao M
Publication year
Publication venue
IEEE Access

External Links

Snippet

The notion of Multi-Key Searchable Encryption (MKSE) enables data owners to outsource their data into a cloud server, while supporting fine-grained data sharing with the authorized users. Note that the traditional MKSE is vulnerable to data leakage. That is, the malicious …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • G06F17/30545Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Du et al. Privacy-preserving indexing and query processing for secure dynamic cloud storage
Yang et al. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
Chen et al. Dual-server public-key encryption with keyword search for secure cloud storage
Wang et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
Paulet et al. Privacy-preserving and content-protecting location based queries
Tong et al. Verifiable fuzzy multi-keyword search over encrypted data with adaptive security
Andola et al. Searchable encryption on the cloud: a survey
Liu et al. An efficient privacy-preserving outsourced computation over public data
Su et al. Efficient verifiable multi-key searchable encryption in cloud computing
CN112332979B (en) Ciphertext search method, system and equipment in cloud computing environment
Yi et al. Privacy-preserving user profile matching in social networks
Miao et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings
Shao et al. Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud
Chen et al. Verifiable dynamic ranked search with forward privacy over encrypted cloud data
Lu et al. Privacy-preserving cloud database querying.
Du et al. A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
Wang et al. Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption
Wang et al. Is homomorphic encryption the holy grail for database queries on encrypted data?
Deng et al. Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data
Li et al. Efficient data retrieval over encrypted attribute-value type databases in cloud-assisted ehealth systems
Du et al. A Lightweight Blockchain‐based Public‐Key Authenticated Encryption with Multi‐Keyword Search for Cloud Computing
Li et al. Delegatable order-revealing encryption
Liu et al. A novel secure scheme for supporting complex SQL queries over encrypted databases in cloud computing
EP3861671A1 (en) Continuous space-bounded non-malleable codes from stronger proofs-of-space
Hou et al. Multi‐Party Verifiable Privacy‐Preserving Federated k‐Means Clustering in Outsourced Environment