Articles with "search encrypted" as a keyword



Photo from wikipedia

Secure Similarity Search Over Encrypted Non-Uniform Datasets

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.3000233

Abstract: Searchable symmetric encryption (SSE) enables a user to outsource a private dataset to a cloud server in encrypted form while retaining the ability to search over the encrypted outsourced data. The existing SSE schemes improve… read more here.

Keywords: uniform datasets; search encrypted; similarity search; search ... See more keywords
Photo from wikipedia

QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.3009961

Abstract: In this article, we propose a scheme, named QuickN, which can efficiently and securely enable nearest neighbor search over encrypted data on untrusted clouds. Specifically, we modify the search algorithm of nearest neighbors in tree… read more here.

Keywords: neighbor search; search encrypted; search; quickn practical ... See more keywords
Photo from wikipedia

Verifiable and Dynamic Multi-keyword Search over Encrypted Cloud Data Using Bitmap

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2021.3093304

Abstract: Searchable Symmetric Encryption (SSE), which enables users to search over encrypted data without decryption, has gained increasing attention from both academic and industrial fields. However, existing SSE schemes either have low search efficiency or cannot… read more here.

Keywords: keyword; search; bitmap; keyword search ... See more keywords
Photo by sickhews from unsplash

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2021.3118692

Abstract: Symmetric Searchable Encryption (SSE) schemes facilitate searching over encrypted data, and have been extensively explored to improve function, efficiency or security. There are, however, additional functions that we need to consider in a real-world setting.… read more here.

Keywords: verifiable boolean; search encrypted; towards efficient; boolean search ... See more keywords
Photo from wikipedia

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2016.2599883

Abstract: Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plaintexts. However, most existing searchable encryption schemes only support single or conjunctive… read more here.

Keywords: encrypted data; search; keyword search; search encrypted ... See more keywords
Photo by ldxcreative from unsplash

Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2021.3140098

Abstract: Ranked keyword search over encrypted data has been extensively studied in cloud computing as it enables data users to find the most relevant results quickly. However, existing ranked multi-keyword search solutions cannot achieve efficient ciphertext… read more here.

Keywords: keyword search; mml; search encrypted; ranked keyword ... See more keywords
Photo from wikipedia

Efficient multi-keyword similarity search over encrypted cloud documents

Sign Up to like & get
recommendations!
Published in 2021 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v23.i1.pp510-518

Abstract: Many organizations and individuals are attracted to outsource their data into remote cloud service providers. To ensure privacy, sensitive data should be encrypted be-fore being hosted. However, encryption disables the direct application of the essential… read more here.

Keywords: multi keyword; similarity; search encrypted;