Liu et al., 2022 - Google Patents
Multi-user image retrieval with suppression of search pattern leakageLiu et al., 2022
- Document ID
- 206698541550809552
- Author
- Liu H
- Zhang Y
- Xiang Y
- Liu B
- Guo E
- Publication year
- Publication venue
- Information Sciences
External Links
Snippet
In image retrieval applications for multi-users, users can retrieve similar images in a database. The server can collude with the user and exploit the search patterns to infer the information of other users, which may cause search pattern leakage. However, current …
- 230000001629 suppression 0 title abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage | |
Ning et al. | Passive attacks against searchable encryption | |
Poh et al. | Searchable symmetric encryption: Designs and challenges | |
Pasupuleti et al. | An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing | |
Sun et al. | An efficient non-interactive multi-client searchable encryption with support for boolean queries | |
Tang et al. | Ensuring security and privacy preservation for cloud data services | |
KR101679156B1 (en) | Secure private database querying with content hiding bloom filters | |
CN112270006A (en) | Searchable encryption method for hiding search mode and access mode in e-commerce platform | |
Van Rompay et al. | Multi-user searchable encryption in the cloud | |
Ding et al. | Efficient and privacy-preserving multi-party skyline queries over encrypted data | |
Li et al. | Privacy-preserving data utilization in hybrid clouds | |
CN112332979B (en) | Ciphertext search method, system and equipment in cloud computing environment | |
Liu et al. | Multi-user image retrieval with suppression of search pattern leakage | |
Yiu et al. | Outsourcing search services on private spatial data | |
Ying et al. | Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing | |
Zhang et al. | A dynamic searchable symmetric encryption scheme for multiuser with forward and backward security | |
Zhang et al. | Secdedup: Secure encrypted data deduplication with dynamic ownership updating | |
Awais et al. | A novel searchable encryption scheme to reduce the access pattern leakage | |
Wang et al. | Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption | |
Chamili et al. | Searchable encryption: a review | |
Verma | Secure client-side deduplication scheme for cloud with dual trusted execution environment | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Peng et al. | hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts | |
Yan et al. | Secure and efficient big data deduplication in fog computing | |
Li et al. | Forward and backward secure keyword search with flexible keyword shielding |