4.7 Article

Forward privacy multikeyword ranked search over encrypted database

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds

Hua Zhang et al.

Summary: In this article, a scalable fuzzy keyword ranked search scheme over encrypted data under hybrid clouds architecture is proposed. The similarity of keywords is measured using the edit distance, and an edit distance algorithm over encrypted data is designed to achieve fuzzy keyword search with a constant storage size and accurate results for any similarity threshold. Furthermore, a two-factor ranking function combining keyword weight with keyword morphology similarity is designed to enhance system usability. Extensive experiments are performed to demonstrate the trade-off of efficiency and security of the proposed scheme.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Artificial Intelligence

A precision-preferred comprehensive information extraction system for clinical articles in traditional Chinese Medicine

Ye Xia et al.

Summary: This study aims to create a comprehensive information extraction system for TCM articles, extracting all relevant information from research articles with high precision and efficiency to address bias in every study.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

IPSadas: Identity-privacy-aware secure and anonymous data aggregation scheme

Pei Ren et al.

Summary: Intelligent systems are technologically advanced machines that can sense and respond to the surrounding environment, widely used in various fields. This research proposes a secure and anonymous data aggregation scheme, utilizing key negotiation, secure information transmission, and aggregation routing techniques to protect the identity privacy of important nodes and defend against various attacks effectively.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Secure and efficient parameters aggregation protocol for federated incremental learning and its applications

Xiaoying Wang et al.

Summary: This paper introduces a secure and resource-friendly protocol for parameters aggregation in federated incremental learning, relying on a new method called orthogonal gradient aggregation. The new construction is robust against catastrophic forgetting, maintains accuracy of federated neural network, and is efficient in computation and communication overhead. Extensive experiments over significant data sets demonstrate the efficiency, efficacy, and flexibility of the new protocol.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Automation & Control Systems

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

Jun Zhang et al.

Summary: With the increasing cyber attacks against cyber-physical systems, the use of deep learning methods in detecting these attacks is explored in this survey. A six-step methodology is provided for summarizing and analyzing the literature on applying deep learning methods for cyber attack detection. The survey reveals the great potential of deep learning modules in detecting cyber attacks against CPS systems, with excellent performance achieved partly due to the availability of high-quality datasets. The survey also identifies challenges, opportunities, and future research trends in this area.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2022)

Article Computer Science, Information Systems

Privacy-Preserving Linear Region Search Service

Hua Zhang et al.

Summary: This paper discusses the issue of data outsourcing in geographic information, proposes a privacy-preserving solution for linear region search, uses a quadtree structure to build an index for the POI database, and designs a new algorithm to protect the privacy of LBS providers and users.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage

Hongyang Yan et al.

Summary: The study proposes a privacy-preserving collaborative machine learning scheme to prevent information leakage and enhance efficiency. By utilizing methods such as network transformation, random uploading, and network pruning, it effectively protects model parameters, reduces information inference, and accelerates training.

INFORMATION SCIENCES (2021)

Article Computer Science, Theory & Methods

A Survey of Android Malware Detection with Deep Neural Models

Junyang Qiu et al.

Summary: Deep Learning (DL) is a disruptive technology that has revolutionized cyber security research, especially in the detection and classification of Android malware. While offering many advantages, DL faces challenges such as choice of architecture, feature extraction, and obtaining high-quality data.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Hardware & Architecture

Searchable Symmetric Encryption with Forward Search Privacy

Jin Li et al.

Summary: SSE is widely used in encrypted databases, but faces challenges with information leaks. To enhance security, the notion of forward search privacy has been introduced, posing new challenges for SSE design. Khons is a new SSE scheme that is efficient and meets security requirements.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification

Xinrui Ge et al.

Summary: Verifiable Searchable Symmetric Encryption is an important cloud security technique allowing users to retrieve encrypted data through keywords and verify the results. This paper proposes a practical scheme for achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. By designing a novel Accumulative Authentication Tag and a new secure index, efficient data update and verification are achieved, ensuring both security and efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server

Peiming Xu et al.

Summary: This paper proposes a practical PEKS scheme named PMSEHS that allows email receivers to perform multi-keyword and boolean search in encrypted email database efficiently while protecting their privacy in the cloud server. Comparative experiments show that the scheme is more efficient in multi-keyword search for encrypted emails.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Review Computer Science, Artificial Intelligence

Semantic data mining in the information age: A systematic review

Chanmee Sirichanya et al.

Summary: Data mining is the process of discovering meaningful information in data, and semantic data mining enhances performance by using domain ontologies as background knowledge. The article summarizes the main contributions and limitations of the surveyed literature, and identifies future trends and challenges for researchers in the field.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2021)

Article Computer Science, Information Systems

MHAT: An efficient model-heterogenous aggregation training scheme for federated learning

Li Hu et al.

Summary: The study proposed a novel model-heterogenous aggregation training federated learning scheme MHAT, which uses knowledge distillation technique to achieve information aggregation, enabling clients to effectively collaborate in training a global model without fixing a unified model architecture and reducing the required computing resources.

INFORMATION SCIENCES (2021)

Article Computer Science, Theory & Methods

Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey

Yuantian Miao et al.

Summary: In recent years, stealing attacks against controlled information using machine learning algorithms have emerged as a significant cyber security threat, making detection and defense challenging and urgent. This survey reviews the recent advances in this type of attack, categorizes them into three types based on the targeted controlled information, and proposes countermeasures focusing on detection, disruption, and isolation for effective protection.

ACM COMPUTING SURVEYS (2021)

Proceedings Paper Computer Science, Information Systems

Forward and Backward Private Conjunctive Searchable Symmetric Encryption

Sikhar Patranabis et al.

Summary: Dynamic searchable symmetric encryption (SSE) allows for updates and searches on encrypted data while minimizing information revealed to the server. Forward and backward privacy are crucial security properties in dynamic SSE, but achieving both remains a challenge for schemes supporting conjunctive keyword search. The proposed ODXT scheme aims to provide a practical trade-off between performance and security for very large databases.

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy

Shi-Feng Sun et al.

Summary: The study introduces a generic forward and backward-private DSSE scheme, which is the first practical and non-interactive Type-II backward-private DSSE scheme. It is based on Symmetric Revocable Encryption and implemented with lightweight symmetric primitives, outperforming the most efficient Type-II backward-private scheme by 2-11 times in search performance in a typical network environment.

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)

Article Computer Science, Hardware & Architecture

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency

Xiangfu Song et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Engineering, Electrical & Electronic

Software Vulnerability Detection Using Deep Neural Networks: A Survey

Guanjun Lin et al.

PROCEEDINGS OF THE IEEE (2020)

Article Computer Science, Artificial Intelligence

Secure video retrieval using image query on an untrusted cloud

Hongyang Yan et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

HybridORAM: Practical oblivious cloud storage with constant bandwidth

Bo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Artificial Intelligence

HVDB: a hierarchical verifiable database scheme with scalable updates

Zhiwei Zhang et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations

Licheng Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things

Lingling Xu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

VBTree: forward secure conjunctive queries over encrypted data for cloud computing

Zhiqiang Wu et al.

VLDB JOURNAL (2019)

Article Computer Science, Theory & Methods

The security of machine learning in an adversarial setting: A survey

Xianmin Wang et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Theory & Methods

Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

Jing Li et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Artificial Intelligence

Secure Deduplication System with Active Key Update and Its Application in IoT

Jin Li et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Hardware & Architecture

Searchable Encryption over Feature-Rich Data

Qian Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

Result Pattern Hiding Searchable Encryption for Conjunctive Queries

Shangqi Lai et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Information Systems

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates

Kee Sung Kim et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Wenhai Sun et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Theory & Methods

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

Zhihua Xia et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

Σοφοζ - Forward Secure Searchable Encryption

Raphael Bost

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Ning Cao et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Search pattern leakage in searchable encryption: Attacks and new construction

Chang Liu et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Theory & Methods

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

Cong Wang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Proceedings Paper Computer Science, Hardware & Architecture

Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud

Zhiyong Xu et al.

PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012) (2012)

Article Computer Science, Information Systems

Searchable symmetric encryption: Improved definitions and efficient constructions

Reza Curtmola et al.

JOURNAL OF COMPUTER SECURITY (2011)