An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
Authors
Keywords
Privacy, Insider keyword guessing attack, File-injection attack, Searchable public key encryption, Secure cloud storage
Journal
SOFT COMPUTING
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2018-05-14
DOI
10.1007/s00500-018-3224-8
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
- (2018) Mimi Ma et al. IEEE Transactions on Industrial Informatics
- DivORAM: Towards a practical oblivious RAM with variable block size
- (2018) Zheli Liu et al. INFORMATION SCIENCES
- Socially-conforming cooperative computation in cloud networks
- (2018) Tao Li et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds
- (2018) Hongwei Li et al. IEEE Transactions on Emerging Topics in Computing
- An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
- (2017) Qiong Huang et al. INFORMATION SCIENCES
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- (2017) Yinghui Zhang et al. INFORMATION SCIENCES
- Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing
- (2017) Yinbin Miao et al. IEEE Transactions on Services Computing
- KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
- (2017) Jiguo Li et al. IEEE Transactions on Services Computing
- Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
- (2017) Hongwei Li et al. IEEE Transactions on Cloud Computing
- Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
- (2016) Wenhai Sun et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group
- (2016) Xiao-Fen Wang et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
- (2016) B. B. Gupta et al. NEURAL COMPUTING & APPLICATIONS
- Fine-grained searchable encryption in multi-user setting
- (2016) Jun Ye et al. SOFT COMPUTING
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- (2015) Jin Li et al. IEEE TRANSACTIONS ON COMPUTERS
- On security against the server in designated tester public key encryption with keyword search
- (2015) Zhi-Yi Shao et al. INFORMATION PROCESSING LETTERS
- Secure deduplication storage systems supporting keyword search
- (2015) Jin Li et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
- (2015) Jin Li et al. KNOWLEDGE-BASED SYSTEMS
- Cloud-based electronic health record system supporting fuzzy keyword search
- (2015) Zheli Liu et al. SOFT COMPUTING
- Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
- (2015) Hongwei Li et al. IEEE Transactions on Emerging Topics in Computing
- Secure Deduplication with Efficient and Reliable Convergent Key Management
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Securely Outsourcing Attribute-Based Encryption with Checkability
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- An efficient PHR service system supporting fuzzy keyword search and fine-grained access control
- (2013) Fatos Xhafa et al. SOFT COMPUTING
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- (2012) Peng Xu et al. IEEE TRANSACTIONS ON COMPUTERS
- Trapdoor security in a searchable public-key encryption scheme with a designated tester
- (2009) Hyun Sook Rhee et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Constructing PEKS schemes secure against keyword guessing attacks is possible?
- (2008) Ik Rae Jeong et al. COMPUTER COMMUNICATIONS
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started