[go: up one dir, main page]

Gao et al., 2024 - Google Patents

Verifiable Multi-Level Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoT

Gao et al., 2024

Document ID
2806970186471717883
Author
Gao Y
Ge Y
Ning J
Ma J
Chen X
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

The Internet of Things (IoT) boom has enabled massive data collection in cloud servers. Therefore, access efficiency and data privacy in cloud storage services have become a significant concern. Data and users are hierarchical in IoT applications, which require fine …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Liu et al. Enabling verifiable and dynamic ranked search over outsourced data
Ge et al. Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification
Yang et al. Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
Sun et al. Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
Chen et al. BPVSE: Publicly verifiable searchable encryption for cloud-assisted electronic health records
US20130287210A1 (en) Data processing apparatus and data storage apparatus
Zhu et al. A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing
Li et al. Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
Shen et al. Lightweight cloud storage auditing with deduplication supporting strong privacy protection
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
Liu et al. Verifiable ranked search over dynamic encrypted data in cloud computing
Varri et al. A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments
Miao et al. VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings
Yiu et al. Outsourcing search services on private spatial data
Xiangyang et al. MUSE: an efficient and accurate verifiable privacy‐preserving multikeyword text search over encrypted cloud data
Ying et al. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing
Rashid et al. Secure enterprise data deduplication in the cloud
Li et al. Efficient data retrieval over encrypted attribute-value type databases in cloud-assisted ehealth systems
Huang et al. Fast and privacy-preserving attribute-based keyword search in cloud document services
Park et al. PKIS: practical keyword index search on cloud datacenter
Zhou et al. EVSS: An efficient verifiable search scheme over encrypted cloud data
Lv et al. A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing
Xu et al. Toward full accounting for leakage exploitation and mitigation in dynamic encrypted databases
Gao et al. Verifiable Multi-Level Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoT
Aaraj et al. Exipnos: An efficient verifiable dynamic symmetric searchable encryption scheme with forward and backward privacy