4.5 Article

Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach

Zhitao Guan et al.

Summary: This article proposes a Consortium Blockchain-based Distributed Secure Search (CBDSS) Scheme to protect sensitive data in the e-commerce environment. By integrating blockchain and searchable encryption model, the scheme ensures the reliability and security of data storage and search processes.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2021)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems

Xueqiao Liu et al.

Summary: The article introduces a new searchable encryption scheme that supports multi-keyword search under a multi-user setting, hides search pattern and access pattern, and prevents keyword guessing attacks (KGA) by adopting a multi-server architecture. The scheme also introduces a novel subset decision mechanism as the core technique and demonstrates its security and efficiency for practical use.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

Yinbin Miao et al.

Summary: CP-ABKS system enables search queries and fine-grained access control over encrypted data in the cloud, but lacks effective support for shared multi-owner settings and privacy protection. The proposed ABKS-SM systems emphasize privacy preservation and malicious user tracing, with features of selective security and resistance to offline keyword-guessing attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Automation & Control Systems

Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs

Yang Lu et al.

Summary: Industrial IoT (IIoT) is an practical application of the Internet of Things (IoT) in modern industry that accelerates industrial development. The recent certificate-based encryption with keyword search (CBEKS) scheme aims to address data privacy protection in the cloud, showing advantages in computation performance and security against keyword guessing attacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Hardware & Architecture

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data

Yinbin Miao et al.

Summary: This paper introduces a secure Multi-authority CP-ABKS (MABKS) system to address limitations in existing CP-ABKS schemes and minimize the computation and storage burden on resource-limited devices in cloud systems. The MABKS system is selectively secure in both selective-matrix and selective-attribute models, demonstrating efficiency and utility in practical applications.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Theory & Methods

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption

Qiyang Song et al.

Summary: The proposed SAP-SSE scheme in this paper protects both access patterns and search patterns in a generic database setting by leveraging re-encryption cryptosystems to shuffle index entries over multiple clouds for protecting search patterns, and distributing secure indexes to multiple clouds along with an index redistribution protocol for protecting access patterns. Additionally, it provides a configurable security policy to balance security and efficiency while preventing pattern leakage with low overhead, as demonstrated by formal security analysis and experimental evaluation.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

Yinbin Miao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

Haijiang Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage

Mohammad Hassan Ameri et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2020)

Article Computer Science, Theory & Methods

A fully distributed hierarchical attribute-based encryption scheme

Mohammad Ali et al.

THEORETICAL COMPUTER SCIENCE (2020)

Article Engineering, Electrical & Electronic

Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV

Chaosheng Feng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing

Yinbin Miao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2019)

Article Telecommunications

A Mechanism for Securing IoT-enabled Applications at the Fog Layer

Nadeem Abbas et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2019)

Article Computer Science, Information Systems

Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage

Jin Sun et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

Shangping Wang et al.

IEEE ACCESS (2019)

Review Computer Science, Hardware & Architecture

Big data analytics for wireless and wired network design: A survey

Mohammed S. Hadi et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Theory & Methods

Verifiable searchable encryption with aggregate keys for data sharing system

Zheli Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Automation & Control Systems

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications

Yong Yu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Proceedings Paper Computer Science, Theory & Methods

Optimisation of the Public Key Encryption Infrastructure for the Internet of Things

Daniel Kelly et al.

ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (2018)

Article Computer Science, Information Systems

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

Shuo Qiu et al.

SCIENCE CHINA-INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Review Computer Science, Information Systems

Fog computing security: a review of current applications and security solutions

Saad Khan et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)

Article Computer Science, Interdisciplinary Applications

Cloud computing security: challenges and future trends

Tarek Radwan et al.

INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY (2017)

Article Computer Science, Theory & Methods

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Wenhai Sun et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage

Kaitai Liang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Hardware & Architecture

Beyond lightning: A survey on security challenges in cloud computing

Chunming Rong et al.

COMPUTERS & ELECTRICAL ENGINEERING (2013)

Article Computer Science, Theory & Methods

Internet of Things (IoT): A vision, architectural elements, and future directions

Jayavardhana Gubbi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Theory & Methods

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Cong Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Review Computer Science, Hardware & Architecture

A survey on security issues in service delivery models of cloud computing

S. Subashini et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)