Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems
Y Miao, Y Yang, X Li, KKR Choo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid development of Intelligent Transportation System (ITS), a large number of
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …
spatial data are generated in ITS. Although outsourcing spatial data to the cloud server can …
Location privacy-preserving task recommendation with geometric range query in mobile crowdsensing
In mobile crowdsensing, location-based task recommendation requires each data requester
to submit a task-related geometric range to crowdsensing service providers such that they …
to submit a task-related geometric range to crowdsensing service providers such that they …
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption
Searchable symmetric encryption enables private queries over an encrypted database, but it
can also result in information leakages. Adversaries can exploit these leakages to launch …
can also result in information leakages. Adversaries can exploit these leakages to launch …
Forward and backward private conjunctive searchable symmetric encryption
Dynamic searchable symmetric encryption (SSE) supports updates and keyword searches
in tandem on outsourced symmetrically encrypted data, while aiming to minimize the …
in tandem on outsourced symmetrically encrypted data, while aiming to minimize the …
Search me in the dark: Privacy-preserving boolean range query over encrypted spatial data
With the increasing popularity of geo-positioning technologies and mobile Internet, spatial
keyword data services have attracted growing interest from both the industrial and academic …
keyword data services have attracted growing interest from both the industrial and academic …
Efficient privacy-preserving spatial data query in cloud computing
With the rapid development of geographic location technology and the explosive growth of
data, a large amount of spatial data is outsourced to the cloud server for reducing the local …
data, a large amount of spatial data is outsourced to the cloud server for reducing the local …
Leakage-abuse attacks against forward and backward private searchable symmetric encryption
Dynamic searchable symmetric encryption (DSSE) enables a server to efficiently search and
update over encrypted files. To minimize the leakage during updates, a security notion …
update over encrypted files. To minimize the leakage during updates, a security notion …
Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search
With the prevalence of cloud computing, a growing number of users are delegating clouds to
host their sensitive data. To preserve user privacy, it is suggested that data is encrypted …
host their sensitive data. To preserve user privacy, it is suggested that data is encrypted …
LEAP: leakage-abuse attack on efficiently deployable, efficiently searchable encryption with partially known dataset
Searchable Encryption (SE) enables private queries on encrypted documents. Most existing
SE schemes focus on constructing industrial-ready, practical solutions at the expense of …
SE schemes focus on constructing industrial-ready, practical solutions at the expense of …