[go: up one dir, main page]

Buchade et al., 2018 - Google Patents

A study on searchable encryption schemes

Buchade et al., 2018

View PDF
Document ID
15849880749745466796
Author
Buchade S
Devale P
Publication year
Publication venue
International Journal of Engineering & Technology

External Links

Snippet

To manage large volume of data, most of the organizations and data owners outsource their data to remote cloud storage servers. Since the remote servers are untrusted party, the data has to be encrypted to achieve security and privacy. But encryption and decryption causes …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • G06F17/30545Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems

Similar Documents

Publication Publication Date Title
Miao et al. Hybrid keyword-field search with efficient key management for industrial internet of things
Pasupuleti et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
CN106815350B (en) Dynamic ciphertext multi-keyword fuzzy search method in cloud environment
Raykova et al. Secure anonymous database search
Han et al. Secure searches in the cloud: A survey
Yuan et al. DedupDUM: Secure and scalable data deduplication with dynamic user management
CN105681280A (en) Searchable encryption method based on Chinese in cloud environment
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
Sun et al. Research on logistics information blockchain data query algorithm based on searchable encryption
Zhang et al. A dynamic searchable symmetric encryption scheme for multiuser with forward and backward security
Edalatnejad et al. {DatashareNetwork}: A decentralized {Privacy-Preserving} search engine for investigative journalists
Park et al. PKIS: practical keyword index search on cloud datacenter
Dayıoğlu Secure database in cloud computing-cryptdb revisited
Purushothama et al. Efficient query processing on outsourced encrypted data in cloud with privacy preservation
CN119311644A (en) A homomorphic encryption ciphertext retrieval method and system based on hardware encryption card
Sreekumari Privacy-preserving keyword search schemes over encrypted cloud data: an extensive analysis
Di Crescenzo et al. Practical and privacy-preserving policy compliance for outsourced data
Muhammad et al. A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
Manasrah et al. An investigation study of privacy preserving in cloud computing environment
Yan et al. Secure and efficient big data deduplication in fog computing
Buchade et al. A study on searchable encryption schemes
Sun et al. Research of data security model in cloud computing platform for SMEs
Jiang et al. A novel privacy preserving keyword search scheme over encrypted cloud data
Blömer et al. Dynamic searchable encryption with access control
Zhang et al. Privacy-preserving multi-pattern matching