EPSMR: An efficient privacy-preserving semantic-aware multi-keyword ranked search scheme in cloud

Y Liu, H Dai, Q Zhou, P Li, X Yi, G Yang - Future Generation Computer …, 2024 - Elsevier
Traditional privacy-preserving search schemes have commonly used the TF-IDF model,
which relies on keyword frequency statistics but neglects the semantic relationships …

Forward/backward and content private DSSE for spatial keyword queries

X Wang, J Ma, X Liu, Y Miao, Y Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Spatial keyword queries are attractive techniques that have been widely deployed in real-life
applications in recent years, such as social networks and location-based services. However …

Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data

X Ge, J Yu, F Kong - Information Sciences, 2024 - Elsevier
Boolean range query, as one typical spatial keyword query, has received more and more
attention and been widely deployed in many applications. To release the storage and …

Enabling Efficient Privacy-Preserving Spatiotemporal Location-Based Services for Smart Cities

Z Li, J Ma, Y Miao, X Wang, J Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
GPS-enabled Internet of Things devices, which can obtain the location and temporal
information of installed objects to promote location-based service, are completely changing …

Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data

Y Liu, J Yu, M Yang, W Hou, H Wang - Future Generation Computer …, 2022 - Elsevier
As cloud computing and Internet of Things (IoT) are becoming more and more deeply
integrated, the new secure challenge for IoT data has attracted great attention. Privacy …

VPRQ: Verifiable and privacy-preserving range query over encrypted cloud data

X Nie, A Zhang, Y Wang, W Wang, S Yu - Computers and Electrical …, 2024 - Elsevier
Cloud has scalable storage and massive computing power, attracting data owners to
outsource their data. However, owing to privacy concerns, data is typically encrypted prior to …

Range search over encrypted multi-attribute data

F Falzon, EA Markatou, Z Espiritu… - Cryptology ePrint …, 2022 - eprint.iacr.org
This work addresses expressive queries over encrypted data by presenting the first
systematic study of multi-attribute range search on a symmetrically encrypted database …

[HTML][HTML] Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme

NH Sultan, SK Kermanshahi, HY Tran, S Lai… - Ad Hoc Networks, 2024 - Elsevier
The rapid progress in the field of IoT and its wide-ranging applications emphasize the
criticality of robust security measures for effectively sharing, storing, and managing sensitive …

Privacy-preserving Spatial Dataset Search in Cloud

P Li, H Dai, S Wang, W Yang, G Yang - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
The development of cloud computing has met the growing demand for dataset search in the
era of massive data. In the field of spatial dataset search, the high prevalence of sensitive …

Semantic‐Based Multi‐Keyword Ranked Search Schemes over Encrypted Cloud Data

Z Hu, H Dai, G Yang, X Yi… - Security and …, 2022 - Wiley Online Library
Traditional searchable encryption schemes construct document vectors based on the term
frequency‐inverse document frequency (TF‐IDF) model. Such vectors are not only high …