Su et al., 2019 - Google Patents
Efficient verifiable multi-key searchable encryption in cloud computingSu et al., 2019
View PDF- Document ID
- 13245883782823751193
- Author
- Su Y
- Wang J
- Wang Y
- Miao M
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
The notion of Multi-Key Searchable Encryption (MKSE) enables data owners to outsource their data into a cloud server, while supporting fine-grained data sharing with the authorized users. Note that the traditional MKSE is vulnerable to data leakage. That is, the malicious …
- 238000010276 construction 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
- G06F17/30545—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Du et al. | Privacy-preserving indexing and query processing for secure dynamic cloud storage | |
Yang et al. | Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage | |
Chen et al. | Dual-server public-key encryption with keyword search for secure cloud storage | |
Wang et al. | Efficient verifiable fuzzy keyword search over encrypted data in cloud computing | |
Paulet et al. | Privacy-preserving and content-protecting location based queries | |
Tong et al. | Verifiable fuzzy multi-keyword search over encrypted data with adaptive security | |
Andola et al. | Searchable encryption on the cloud: a survey | |
Liu et al. | An efficient privacy-preserving outsourced computation over public data | |
Su et al. | Efficient verifiable multi-key searchable encryption in cloud computing | |
CN112332979B (en) | Ciphertext search method, system and equipment in cloud computing environment | |
Yi et al. | Privacy-preserving user profile matching in social networks | |
Miao et al. | VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings | |
Shao et al. | Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud | |
Chen et al. | Verifiable dynamic ranked search with forward privacy over encrypted cloud data | |
Lu et al. | Privacy-preserving cloud database querying. | |
Du et al. | A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing | |
Wang et al. | Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption | |
Wang et al. | Is homomorphic encryption the holy grail for database queries on encrypted data? | |
Deng et al. | Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data | |
Li et al. | Efficient data retrieval over encrypted attribute-value type databases in cloud-assisted ehealth systems | |
Du et al. | A Lightweight Blockchain‐based Public‐Key Authenticated Encryption with Multi‐Keyword Search for Cloud Computing | |
Li et al. | Delegatable order-revealing encryption | |
Liu et al. | A novel secure scheme for supporting complex SQL queries over encrypted databases in cloud computing | |
EP3861671A1 (en) | Continuous space-bounded non-malleable codes from stronger proofs-of-space | |
Hou et al. | Multi‐Party Verifiable Privacy‐Preserving Federated k‐Means Clustering in Outsourced Environment |