[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Miao et al., 2017 - Google Patents

VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings

Miao et al., 2017

View PDF
Document ID
5885326102099972185
Author
Miao Y
Ma J
Liu X
Zhang J
Liu Z
Publication year
Publication venue
Science China Information Sciences

External Links

Snippet

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but …
Continue reading at ink.library.smu.edu.sg (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/3007File system administration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Miao et al. Privacy-preserving attribute-based keyword search in shared multi-owner setting
Miao et al. Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage
Cui et al. SVkNN: Efficient secure and verifiable k-nearest neighbor query on the cloud platform
Jiang et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Lu et al. Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices
Miao et al. Fair and dynamic data sharing framework in cloud-assisted internet of everything
Miao et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings
Miao et al. VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings
Chen et al. Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
Chen et al. Blockchain‐Enabled Public Key Encryption with Multi‐Keyword Search in Cloud Computing
Miao et al. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner
Xie et al. Blockchain‐Based Cloud Data Integrity Verification Scheme with High Efficiency
Yang et al. Efficient and anonymous authentication for healthcare service with cloud based WBANs
Liu et al. EMK-ABSE: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination
Miao et al. Threshold multi-keyword search for cloud-based group data sharing
He et al. On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
Yan et al. Blockchain-based searchable encryption scheme with fair payment
Wang et al. Secure‐aware and privacy‐preserving electronic health record searching in cloud environment
Zhang et al. Conditional anonymous certificateless public auditing scheme supporting data dynamics for cloud storage systems
Mishra et al. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
Du et al. A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
Han et al. TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
Yan et al. Efficient Privacy‐Preserving Certificateless Public Auditing of Data in Cloud Storage
Cui et al. Towards Multi-User, Secure, and Verifiable $ k $ NN Query in Cloud Database
Sun et al. Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation