A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
Online personal health record (PHR) enables patients to manage their own medical records
in a centralized way, which greatly facilitates the storage, access and sharing of personal …
in a centralized way, which greatly facilitates the storage, access and sharing of personal …
Confidentiality-preserving publish/subscribe: A survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale
distributed applications running across multiple administrative domains. Pub/sub allows …
distributed applications running across multiple administrative domains. Pub/sub allows …
An efficient non-interactive multi-client searchable encryption with support for boolean queries
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …
Shared and searchable encrypted data for untrusted servers
Current security mechanisms are not suitable for organisations that outsource their data
management to untrusted servers. Encrypting and decrypting sensitive data at the client side …
management to untrusted servers. Encrypting and decrypting sensitive data at the client side …
Automatically detecting and describing high level actions within methods
One approach to easing program comprehension is to reduce the amount of code that a
developer has to read. Describing the high level abstract algorithmic actions associated with …
developer has to read. Describing the high level abstract algorithmic actions associated with …
File-centric multi-key aggregate keyword searchable encryption for industrial internet of things
Cloud storage has been used to reduce the cost and support convenient collaborations for
industrial Internet of things (IIoT) data management. When data owners share IIoT data with …
industrial Internet of things (IIoT) data management. When data owners share IIoT data with …
Efficient encrypted keyword search for multi-user data sharing
In this paper, we provide a secure and efficient encrypted keyword search scheme for multi-
user data sharing. Specifically, a data owner outsources a set of encrypted files to an …
user data sharing. Specifically, a data owner outsources a set of encrypted files to an …
Privacy-preserving data processing with flexible access control
Cloud computing provides an efficient and convenient platform for cloud users to store,
process and control their data. Cloud overcomes the bottlenecks of resource-constrained …
process and control their data. Cloud overcomes the bottlenecks of resource-constrained …
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
F Zhao, T Nishide, K Sakurai - … , ISPEC 2011, Guangzhou, China, May 30 …, 2011 - Springer
We consider the problem of constructing a secure cloud storage service to which users
outsource sensitive data for sharing with others where, in particular, the service provider is …
outsource sensitive data for sharing with others where, in particular, the service provider is …