[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Liu et al., 2022 - Google Patents

Multi-user image retrieval with suppression of search pattern leakage

Liu et al., 2022

Document ID
206698541550809552
Author
Liu H
Zhang Y
Xiang Y
Liu B
Guo E
Publication year
Publication venue
Information Sciences

External Links

Snippet

In image retrieval applications for multi-users, users can retrieve similar images in a database. The server can collude with the user and exploit the search patterns to infer the information of other users, which may cause search pattern leakage. However, current …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Similar Documents

Publication Publication Date Title
Yang et al. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
Ning et al. Passive attacks against searchable encryption
Poh et al. Searchable symmetric encryption: Designs and challenges
Pasupuleti et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
Sun et al. An efficient non-interactive multi-client searchable encryption with support for boolean queries
Tang et al. Ensuring security and privacy preservation for cloud data services
KR101679156B1 (en) Secure private database querying with content hiding bloom filters
CN112270006A (en) Searchable encryption method for hiding search mode and access mode in e-commerce platform
Van Rompay et al. Multi-user searchable encryption in the cloud
Ding et al. Efficient and privacy-preserving multi-party skyline queries over encrypted data
Li et al. Privacy-preserving data utilization in hybrid clouds
CN112332979B (en) Ciphertext search method, system and equipment in cloud computing environment
Liu et al. Multi-user image retrieval with suppression of search pattern leakage
Yiu et al. Outsourcing search services on private spatial data
Ying et al. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Zhang et al. A dynamic searchable symmetric encryption scheme for multiuser with forward and backward security
Zhang et al. Secdedup: Secure encrypted data deduplication with dynamic ownership updating
Awais et al. A novel searchable encryption scheme to reduce the access pattern leakage
Wang et al. Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption
Chamili et al. Searchable encryption: a review
Verma Secure client-side deduplication scheme for cloud with dual trusted execution environment
Park et al. PKIS: practical keyword index search on cloud datacenter
Peng et al. hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts
Yan et al. Secure and efficient big data deduplication in fog computing
Li et al. Forward and backward secure keyword search with flexible keyword shielding