Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing

Y Zou, T Peng, G Wang, E Luo, J **ong - Journal of Systems Architecture, 2023 - Elsevier
Cloud-based data sharing has become a significant technology trend thanks for its
convenience and economy. Data owners are suggested to encrypt data before outsourcing …

Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment

J Feng, LT Yang, Q Zhu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Tensors are popular and versatile tools which model multidimensional data. Tensor
decomposition has emerged as a powerful technique dealing with multidimensional data …

Efficient, revocable, and privacy-preserving fine-grained data sharing with keyword search for the cloud-assisted medical IoT system

Y Bao, W Qiu, P Tang, X Cheng - IEEE Journal of Biomedical …, 2021 - ieeexplore.ieee.org
The cloud-assisted medical Internet of Things (MIoT) has played a revolutionary role in
promoting the quality of public medical services. However, the practical deployment of cloud …

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing

H Wang, Y Li, W Susilo, DH Duong, F Luo - Computer Standards & …, 2022 - Elsevier
How to use efficient search mechanisms to realize data sharing while ensuring data security
has become an important research topic at present. In this paper, we propose a new …

Share your data carefree: An efficient, scalable and privacy-preserving data sharing service in cloud computing

J Sun, G Xu, T Zhang, H **ong, H Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Benefiting from the powerful computing and storage capabilities of cloud services, data
sharing in the cloud has been permeated across various applications including social …

Enabling traceable and verifiable multi-user forward secure searchable encryption in hybrid cloud

A Wu, A Yang, W Luo, J Wen - IEEE Transactions on Cloud …, 2022 - ieeexplore.ieee.org
Forward secure searchable encryption (FSSE) scheme allows one data user to search on
encrypted databases while resisting the file injection attack. The data utilization can be …

Str-abks: Server-aided traceable and revocable attribute-based encryption with keyword search

F Meng, L Cheng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive
achieving search functionality and access control for the encrypted data outsourced to the …

Privacy-preserving spatio-temporal keyword search for outsourced location-based services

Q Huang, J Du, G Yan, Y Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the popularization of location-based services (LBS), encryption techniques have been
utilized to protect data security when outsourcing LBS to cloud. However, existing schemes …

Outsourcing LDA-based face recognition to an untrusted cloud

Y Ren, Z Song, S Sun, JK Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Face recognition has been extensively employed in practice, such as attendance system
and public security. Linear discriminant analysis (LDA) algorithm is one of the most …

Attribute-based expressive and ranked keyword search over encrypted documents in cloud computing

Q Huang, G Yan, Q Wei - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
Attribute-based keyword search (ABKS) has been proposed to realize fine-grained access
control and provide search service in cloud computing. However, most ABKS schemes focus …