A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings

M Li, S Yu, K Ren, W Lou - … and Privacy in Communication Networks: 6th …, 2010 - Springer
Online personal health record (PHR) enables patients to manage their own medical records
in a centralized way, which greatly facilitates the storage, access and sharing of personal …

Confidentiality-preserving publish/subscribe: A survey

E Onica, P Felber, H Mercier, E Rivière - ACM computing surveys (CSUR …, 2016 - dl.acm.org
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale
distributed applications running across multiple administrative domains. Pub/sub allows …

An efficient non-interactive multi-client searchable encryption with support for boolean queries

SF Sun, JK Liu, A Sakzad, R Steinfeld… - … Security–ESORICS 2016 …, 2016 - Springer
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …

Shared and searchable encrypted data for untrusted servers

C Dong, G Russello, N Dulay - Journal of Computer Security, 2011 - content.iospress.com
Current security mechanisms are not suitable for organisations that outsource their data
management to untrusted servers. Encrypting and decrypting sensitive data at the client side …

Automatically detecting and describing high level actions within methods

G Sridhara, L Pollock, K Vijay-Shanker - Proceedings of the 33rd …, 2011 - dl.acm.org
One approach to easing program comprehension is to reduce the amount of code that a
developer has to read. Describing the high level abstract algorithmic actions associated with …

File-centric multi-key aggregate keyword searchable encryption for industrial internet of things

R Zhou, X Zhang, X Du, X Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud storage has been used to reduce the cost and support convenient collaborations for
industrial Internet of things (IIoT) data management. When data owners share IIoT data with …

Efficient encrypted keyword search for multi-user data sharing

A Kiayias, O Oksuz, A Russell, Q Tang… - … Security–ESORICS 2016 …, 2016 - Springer
In this paper, we provide a secure and efficient encrypted keyword search scheme for multi-
user data sharing. Specifically, a data owner outsources a set of encrypted files to an …

Privacy-preserving data processing with flexible access control

D Wenxiu, Z Yan, RH Deng - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Cloud computing provides an efficient and convenient platform for cloud users to store,
process and control their data. Cloud overcomes the bottlenecks of resource-constrained …

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

F Zhao, T Nishide, K Sakurai - … , ISPEC 2011, Guangzhou, China, May 30 …, 2011 - Springer
We consider the problem of constructing a secure cloud storage service to which users
outsource sensitive data for sharing with others where, in particular, the service provider is …