Fog-enabled secure and efficient fine-grained searchable data sharing and management scheme for IoT-based healthcare systems
BB Gupta, MD Lytras - IEEE Transactions on Engineering …, 2022 - ieeexplore.ieee.org
In recent times, fog computing has emerged as a helpful extension of cloud computing. It can
efficiently handle the prevalent issue of managing silos of data generated by today's digital …
efficiently handle the prevalent issue of managing silos of data generated by today's digital …
Blockchain-enabled fine-grained searchable encryption with cloud–edge computing for electronic health records sharing
H Gao, H Huang, L Xue, F **ao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The integration of Internet of Things (IoT) with cloud–edge computing in cyber–physical
systems has revolutionized the way healthcare enterprises manage electronic health …
systems has revolutionized the way healthcare enterprises manage electronic health …
Str-abks: Server-aided traceable and revocable attribute-based encryption with keyword search
F Meng, L Cheng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive
achieving search functionality and access control for the encrypted data outsourced to the …
achieving search functionality and access control for the encrypted data outsourced to the …
Fast and privacy-preserving attribute-based keyword search in cloud document services
Q Huang, Q Wei, G Yan, L Zou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Currently, various encryption techniques have been employed to protect the documents in
cloud storage. In particular, attribute-based keyword search (ABKS) is a practical encryption …
cloud storage. In particular, attribute-based keyword search (ABKS) is a practical encryption …
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage
Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in
geographic information systems, location-based services and other applications. It retrieves …
geographic information systems, location-based services and other applications. It retrieves …
Traceable and revocable multi-authority attribute-based keyword search for cloud storage
Abstract Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) provides data
privacy and achieves fine-grained access control over encrypted data in the cloud. However …
privacy and achieves fine-grained access control over encrypted data in the cloud. However …
Multi-keyword searchable encryption for smart grid edge computing
D Wang, P Wu, B Li, H Du, M Luo - Electric Power Systems Research, 2022 - Elsevier
Searchable encryption scheme allows users to search for encrypted data containing some
keywords without decrypting data. It protects the data privacy of data owners while …
keywords without decrypting data. It protects the data privacy of data owners while …
Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data
H Shen, J Zhou, G Wu, M Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
The convenience and efficient management of cloud servers have resulted in an increasing
number of users opting to store their data in the cloud. Consequently, data-outsourcing …
number of users opting to store their data in the cloud. Consequently, data-outsourcing …
Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system
H Liu, L Deng, Y Mou, B Li, J Wen - Computers and Electrical Engineering, 2024 - Elsevier
In cloud-assisted telemedicine information system (CA-TMIS), patients upload data
containing their health metrics to the cloud. Doctors can access the patient's data through …
containing their health metrics to the cloud. Doctors can access the patient's data through …
A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
Outsourcing data to cloud services is a good solution for users with limited computing
resources. Privacy and confidentiality of data is jeopardized when data is transferred and …
resources. Privacy and confidentiality of data is jeopardized when data is transferred and …