Gao et al., 2024 - Google Patents
Verifiable Multi-Level Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoTGao et al., 2024
- Document ID
- 2806970186471717883
- Author
- Gao Y
- Ge Y
- Ning J
- Ma J
- Chen X
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
The Internet of Things (IoT) boom has enabled massive data collection in cloud servers. Therefore, access efficiency and data privacy in cloud storage services have become a significant concern. Data and users are hierarchical in IoT applications, which require fine …
- 241000736199 Paeonia 0 abstract description 154
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Enabling verifiable and dynamic ranked search over outsourced data | |
Ge et al. | Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification | |
Yang et al. | Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage | |
Sun et al. | Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data | |
Chen et al. | BPVSE: Publicly verifiable searchable encryption for cloud-assisted electronic health records | |
US20130287210A1 (en) | Data processing apparatus and data storage apparatus | |
Zhu et al. | A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing | |
Li et al. | Integrity-verifiable conjunctive keyword searchable encryption in cloud storage | |
Shen et al. | Lightweight cloud storage auditing with deduplication supporting strong privacy protection | |
CN106776904A (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
Liu et al. | Verifiable ranked search over dynamic encrypted data in cloud computing | |
Varri et al. | A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments | |
Miao et al. | VKSE-MO: Verifiable keyword search over encrypted data in multi-owner settings | |
Yiu et al. | Outsourcing search services on private spatial data | |
Xiangyang et al. | MUSE: an efficient and accurate verifiable privacy‐preserving multikeyword text search over encrypted cloud data | |
Ying et al. | Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing | |
Rashid et al. | Secure enterprise data deduplication in the cloud | |
Li et al. | Efficient data retrieval over encrypted attribute-value type databases in cloud-assisted ehealth systems | |
Huang et al. | Fast and privacy-preserving attribute-based keyword search in cloud document services | |
Park et al. | PKIS: practical keyword index search on cloud datacenter | |
Zhou et al. | EVSS: An efficient verifiable search scheme over encrypted cloud data | |
Lv et al. | A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing | |
Xu et al. | Toward full accounting for leakage exploitation and mitigation in dynamic encrypted databases | |
Gao et al. | Verifiable Multi-Level Dynamic Searchable Encryption With Forward and Backward Privacy in Cloud-Assisted IoT | |
Aaraj et al. | Exipnos: An efficient verifiable dynamic symmetric searchable encryption scheme with forward and backward privacy |