Security and privacy protection in cloud computing: Discussions and challenges
PJ Sun - Journal of Network and Computer Applications, 2020 - Elsevier
With the development of cloud computing, privacy security issues have become increasingly
prominent, which is of concern to industry and academia. We review the research progress …
prominent, which is of concern to industry and academia. We review the research progress …
Searchable symmetric encryption: Designs and challenges
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
encrypted data without the risk of data leakage. Despite the widespread interest, existing …
Forward secure dynamic searchable symmetric encryption with efficient updates
KS Kim, M Kim, D Lee, JH Park, WH Kim - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
The recently proposed file-injection type attacks are highlighting the importance of forward
security in dynamic searchable symmetric encryption (DSSE). Forward security enables to …
security in dynamic searchable symmetric encryption (DSSE). Forward security enables to …
Searchable encryption for healthcare clouds: A survey
R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
Outsourcing medical data and their search services to a third party cloud have been a
popular trend for many medical practices, because using healthcare cloud services can help …
popular trend for many medical practices, because using healthcare cloud services can help …
ROSE: Robust searchable encryption with forward and backward security
Dynamic searchable symmetric encryption (DSSE) has been widely recognized as a
promising technique to delegate update and search queries over an outsourced database to …
promising technique to delegate update and search queries over an outsourced database to …
Lattice-based public key searchable encryption from experimental perspectives
Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data
privacy versus utilization dilemma by allowing any user in the system to send encrypted files …
privacy versus utilization dilemma by allowing any user in the system to send encrypted files …
Location privacy in cognitive radio networks: A survey
Cognitive radio networks (CRNs) have emerged as an essential technology to enable
dynamic and opportunistic spectrum access which aims to exploit underutilized licensed …
dynamic and opportunistic spectrum access which aims to exploit underutilized licensed …
Attribute-based access control meets blockchain-enabled searchable encryption: A flexible and privacy-preserving framework for multi-user search
J Han, Z Li, J Liu, H Wang, M Xian, Y Zhang, Y Chen - Electronics, 2022 - mdpi.com
Searchable encryption enables users to enjoy search services while protecting the security
and privacy of their outsourced data. Blockchain-enabled searchable encryption delivers the …
and privacy of their outsourced data. Blockchain-enabled searchable encryption delivers the …
A secure searchable encryption framework for privacy-critical cloud storage services
Searchable encryption has received a significant attention from the research community with
various constructions being proposed, each achieving asymptotically optimal complexity for …
various constructions being proposed, each achieving asymptotically optimal complexity for …
Searchable encryption: A survey
D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …
relevant literature. Since the existing survey articles are primarily written for the security …