Miao et al., 2017 - Google Patents
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channelMiao et al., 2017
- Document ID
- 3578514217741703789
- Author
- Miao Y
- Ma J
- Wei F
- Liu Z
- Wang X
- Lu C
- Publication year
- Publication venue
- Peer-to-Peer Networking and Applications
External Links
Snippet
Data outsourcing service has gained remarkable popularity with considerable amount of enterprises and individuals, as it can relief heavy computation and management burden locally. While in most existing models, honest-but-curious cloud service provider (CSP) may …
- 238000010276 construction 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Investment, e.g. financial instruments, portfolio management or fund management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Miao et al. | VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel | |
| Ma et al. | Certificateless searchable public key encryption scheme for industrial internet of things | |
| Li et al. | Full verifiability for outsourced decryption in attribute based encryption | |
| Chen et al. | Blockchain‐Enabled Public Key Encryption with Multi‐Keyword Search in Cloud Computing | |
| Miao et al. | VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner | |
| Liu et al. | Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security | |
| Yi et al. | Privacy-preserving user profile matching in social networks | |
| Miao et al. | Threshold multi-keyword search for cloud-based group data sharing | |
| Miao et al. | VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings | |
| Yu et al. | Provably secure identity based provable data possession | |
| Wang et al. | A privacy-preserving fuzzy interest matching protocol for friends finding in social networks | |
| Hussein et al. | A survey of cryptography cloud storage techniques | |
| Chen et al. | Password-authenticated searchable encryption | |
| Salvakkam et al. | An improved lattice based certificateless data integrity verification techniques for cloud computing | |
| Han et al. | TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage | |
| Shu et al. | SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing | |
| Liu et al. | Message-locked searchable encryption: A new versatile tool for secure cloud storage | |
| Verma | Secure client-side deduplication scheme for cloud with dual trusted execution environment | |
| Shi et al. | Privacy protection in social applications: A ciphertext policy attribute‐based encryption with keyword search | |
| Yadav et al. | Efficient and privacy-preserving location-based services over the cloud | |
| Liu et al. | Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases | |
| Wang et al. | A novel digital rights management in P2P networks based on bitcoin system | |
| Shiraly et al. | Hierarchical identity-based authenticated encryption with keyword search over encrypted cloud data | |
| Yang et al. | Privacy‐Preserving Query Scheme (PPQS) for Location‐Based Services in Outsourced Cloud | |
| Chen et al. | PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain |