Miao et al., 2017 - Google Patents
VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settingsMiao et al., 2017
View PDF- Document ID
- 5885326102099972185
- Author
- Miao Y
- Ma J
- Liu X
- Zhang J
- Liu Z
- Publication year
- Publication venue
- Science China Information Sciences
External Links
Snippet
Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but …
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30289—Database design, administration or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/3007—File system administration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miao et al. | Privacy-preserving attribute-based keyword search in shared multi-owner setting | |
Miao et al. | Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage | |
Cui et al. | SVkNN: Efficient secure and verifiable k-nearest neighbor query on the cloud platform | |
Jiang et al. | Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy | |
Lu et al. | Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices | |
Miao et al. | Fair and dynamic data sharing framework in cloud-assisted internet of everything | |
Miao et al. | VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings | |
Miao et al. | VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings | |
Chen et al. | Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control | |
Chen et al. | Blockchain‐Enabled Public Key Encryption with Multi‐Keyword Search in Cloud Computing | |
Miao et al. | VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner | |
Xie et al. | Blockchain‐Based Cloud Data Integrity Verification Scheme with High Efficiency | |
Yang et al. | Efficient and anonymous authentication for healthcare service with cloud based WBANs | |
Liu et al. | EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination | |
Miao et al. | Threshold multi-keyword search for cloud-based group data sharing | |
He et al. | On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks | |
Yan et al. | Blockchain-based searchable encryption scheme with fair payment | |
Wang et al. | Secure‐aware and privacy‐preserving electronic health record searching in cloud environment | |
Zhang et al. | Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems | |
Mishra et al. | Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | |
Du et al. | A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing | |
Han et al. | TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage | |
Yan et al. | Efficient Privacy‐Preserving Certificateless Public Auditing of Data in Cloud Storage | |
Cui et al. | Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database | |
Sun et al. | Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation |