Buchade et al., 2018 - Google Patents
A study on searchable encryption schemesBuchade et al., 2018
View PDF- Document ID
- 15849880749745466796
- Author
- Buchade S
- Devale P
- Publication year
- Publication venue
- International Journal of Engineering & Technology
External Links
Snippet
To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. Since the remote servers are untrusted party, the data has to be encrypted to achieve security and privacy. But encryption and decryption causes …
- 238000004891 communication 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
- G06F17/30545—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miao et al. | Hybrid keyword-field search with efficient key management for industrial internet of things | |
Pasupuleti et al. | An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing | |
CN106815350B (en) | Dynamic ciphertext multi-keyword fuzzy search method in cloud environment | |
Raykova et al. | Secure anonymous database search | |
Han et al. | Secure searches in the cloud: A survey | |
Yuan et al. | DedupDUM: Secure and scalable data deduplication with dynamic user management | |
CN105681280A (en) | Searchable encryption method based on Chinese in cloud environment | |
CN106776904A (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
Sun et al. | Research on logistics information blockchain data query algorithm based on searchable encryption | |
Zhang et al. | A dynamic searchable symmetric encryption scheme for multiuser with forward and backward security | |
Edalatnejad et al. | {DatashareNetwork}: A decentralized {Privacy-Preserving} search engine for investigative journalists | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Dayıoğlu | Secure database in cloud computing-cryptdb revisited | |
Purushothama et al. | Efficient query processing on outsourced encrypted data in cloud with privacy preservation | |
CN119311644A (en) | A homomorphic encryption ciphertext retrieval method and system based on hardware encryption card | |
Sreekumari | Privacy-preserving keyword search schemes over encrypted cloud data: an extensive analysis | |
Di Crescenzo et al. | Practical and privacy-preserving policy compliance for outsourced data | |
Muhammad et al. | A secure data outsourcing scheme based on Asmuth–Bloom secret sharing | |
Manasrah et al. | An investigation study of privacy preserving in cloud computing environment | |
Yan et al. | Secure and efficient big data deduplication in fog computing | |
Buchade et al. | A study on searchable encryption schemes | |
Sun et al. | Research of data security model in cloud computing platform for SMEs | |
Jiang et al. | A novel privacy preserving keyword search scheme over encrypted cloud data | |
Blömer et al. | Dynamic searchable encryption with access control | |
Zhang et al. | Privacy-preserving multi-pattern matching |