4.8 Article

EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End

Kai Fan et al.

Summary: With the integration of AI, the CEEO network, composed of edge computing and cloud computing, provides innovative technologies for smart grid applications. However, ensuring data privacy and achieving efficient keyword retrieval pose challenges. In this article, a searchable encryption scheme called MSIAP is proposed, which supports multi-keyword subset retrieval and reduces time complexity. The scheme enhances the Apriori algorithm for file relevance mining and establishes a multi-level index structure for efficient retrieval in the smart grid, while preserving data security.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT

B. D. Deebak et al.

Summary: The integration of sensing technologies and cloud computing in electronic healthcare systems and the demands of the Industrial Internet of Things were discussed. A new secure multi-keyword ranked searching scheme (PPP-MKRS) was proposed for encrypted cloud data search, showing advantages in efficiency through experimental analysis.

AD HOC NETWORKS (2022)

Article Computer Science, Information Systems

A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems

Cheng Guo et al.

Summary: This article proposes a secure and efficient range query scheme for outsourced encrypted uncertain data, using pivot mapping and Bloom filters to achieve data privacy and efficient queries.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing

Zhenwei Chen et al.

Summary: The proposed scheme utilizes blockchain technology and searchable encryption to support multi-keyword search and file updates, and utilizes smart contracts to ensure fairness in data transactions. Through numbering files, the scheme achieves verifiability and exhibits high security and performance, being secure against inside keyword guessing attacks and having better computation overhead compared to other related schemes.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Automation & Control Systems

Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems

Cheng Guo et al.

Summary: Wearable body area network plays an important role in the current COVID-19 pandemic. The designed improved symmetric homomorphic cryptosystem and fog-based communication architecture support real-time data processing and monitoring, facilitating decision-making process based on real-time data analysis.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Hardware & Architecture

Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud

Haijiang Wang et al.

Summary: The popularity of e-Healthcare systems has been increasing with the introduction of wearable healthcare devices and sensors, which collect personal health records stored in a remote cloud. To ensure privacy and secure access control, attributes based encryption (ABE) and searchable encryption are being utilized. This efficient hidden policy ABE scheme with keyword search enables efficient keyword search with constant computational overhead and storage overhead, while also enhancing recipient's privacy by hiding the access policy. Additionally, a trapdoor malleability attack is presented, revealing potential vulnerabilities in previous schemes.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

An Efficient Ciphertext Index Retrieval Scheme Based on Edge Computing Framework

Jintao Ling et al.

Summary: With the rapid development of mobile applications, the growth of network traffic has imposed massive pressure on traditional network architectures. As a response to this, mobile edge storage is emerging as a key technology to ensure user experience quality when accessing cloud services, while also addressing data security concerns. This paper proposes an efficient ciphertext index retrieval scheme utilizing searchable encryption and cooperative edge computing to reduce data transportation latency, alleviate data traffic pressure, and ensure data security in the edge network for a more efficient and secure data search service scenario. Simulation results demonstrate significant reductions in backbone network traffic and network latency for users compared to traditional cloud computing schemes.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

Maryam Zarezadeh et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Secure and Trust-Oriented Edge Storage for Internet of Things

Junxu Xia et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT

Mimi Ma et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Information Systems

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain

Xiaodong Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Electronic Health Record Sharing Scheme With Searchable Attribute-Based Encryption on Blockchain

Shufen Niu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Big data for cyber physical systems in industry 4.0: a survey

Li Da Xu et al.

ENTERPRISE INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

A Lightweight Fine-Grained Searchable Encryption Scheme in Fog-Based Healthcare IoT Networks

Hui Li et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Hardware & Architecture

A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications

Ming Zeng et al.

COMPUTER JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Blockchain-based searchable symmetric encryption scheme

Huige Li et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Information Systems

Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems

Dinh C. Nguyen et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage

Jin Sun et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme

Hui Yin et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

Shangping Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable

Shangping Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing

Yinbin Miao et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps

Christian J. D'Orazio et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage

Zhiyuan Zhao et al.

PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018) (2018)

Article Law

Cloud forecasting: Legal visibility issues in saturated environments

Adam J. Brown et al.

COMPUTER LAW & SECURITY REVIEW (2018)

Proceedings Paper Computer Science, Information Systems

Private Large-Scale Databases with Distributed Searchable Symmetric Encryption

Yuval Ishai et al.

TOPICS IN CRYPTOLOGY - CT-RSA 2016 (2016)

Article Computer Science, Information Systems

Searchable symmetric encryption: Improved definitions and efficient constructions

Reza Curtmola et al.

JOURNAL OF COMPUTER SECURITY (2011)