Blocking and filtering techniques for entity resolution: A survey
Entity Resolution (ER), a core task of Data Integration, detects different entity profiles that
correspond to the same real-world object. Due to its inherently quadratic complexity, a series …
correspond to the same real-world object. Due to its inherently quadratic complexity, a series …
Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing
With the ever-increasing amount of data resided in a cloud, how to provide users with secure
and practical query services has become the key to improve the quality of cloud services …
and practical query services has become the key to improve the quality of cloud services …
A sco** review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments
With the emergence of cloud computing, data owners are showing interest to outsource the
data to the cloud servers and allowing the data users to access the data as and when …
data to the cloud servers and allowing the data users to access the data as and when …
PriRadar: A privacy-preserving framework for spatial crowdsourcing
Privacy leakage is a serious issue in spatial crowdsourcing in various scenarios. In this
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …
paper, we study privacy protection in spatial crowdsourcing. The main challenge is to …
Secure fine-grained encrypted keyword search for e-healthcare cloud
E-Healthcare systems are increasingly popular due to the introduction of wearable
healthcare devices and sensors. Personal health records (PHRs) are collected by these …
healthcare devices and sensors. Personal health records (PHRs) are collected by these …
Lattice-based public key searchable encryption with fine-grained access control for edge computing
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices,
edge computing provides various on-demand data services to reduce latency and network …
edge computing provides various on-demand data services to reduce latency and network …
Hardening database padding for searchable encryption
Searchable encryption (SE) is a practical crypto-graphic primitive to build encrypted
databases. Recently there has been much attention in leakage-abuse attacks against SE …
databases. Recently there has been much attention in leakage-abuse attacks against SE …
Achieving efficient and privacy-preserving exact set similarity search over encrypted data
Set similarity search, aiming to search the similar sets to a query set, has wide application in
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …
today's recommendation services. Meanwhile, the rapid advance in cloud technique has …
Building a dynamic searchable encrypted medical database for multi-client
E-medical record is an emerging health information exchange model based on cloud
computing. As cloud computing allows companies and individuals to outsource their data …
computing. As cloud computing allows companies and individuals to outsource their data …
Efficient privacy-preserving similarity range query with quadsector tree in ehealthcare
As a consequence of advance in the Internet of Things (IoT) and big data technology, smart
eHealthcare has emerged and greatly enabled patients to enjoy high-quality healthcare …
eHealthcare has emerged and greatly enabled patients to enjoy high-quality healthcare …