Bahrami et al., 2022 - Google Patents
A new secure and searchable data outsourcing leveraging a Bucket-Chain index treeBahrami et al., 2022
- Document ID
- 1396124142527360472
- Author
- Bahrami S
- Ghasemi R
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
Data outsourcing aims to mitigate our concerns about data security and reliability by ensuring that the data is handled in a professional manner. Due to a lack of assurances regarding the reliability and security of data stored on servers, the increasing use of …
- 238000004458 analytical method 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hao et al. | Fine-grained data access control with attribute-hiding policy for cloud-based IoT | |
Pasupuleti et al. | An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing | |
Raman et al. | Distributed storage meets secret sharing on the blockchain | |
Wang et al. | Private information retrieval using trusted hardware | |
Bahrami et al. | A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree | |
Narayanan et al. | Obfuscated databases and group privacy | |
Yiu et al. | Outsourcing search services on private spatial data | |
US11886617B1 (en) | Protecting membership and data in a secure multi-party computation and/or communication | |
Ghasemi | Resolving a common vulnerability in secret sharing scheme–based data outsourcing schemes | |
Kantarcioglu et al. | An architecture for privacy-preserving mining of client information | |
Zhang et al. | Secure distributed keyword search in multiple clouds | |
Jia et al. | Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption | |
Siva Kumar et al. | Searchable encryption approaches: attacks and challenges | |
Barouti et al. | Symmetrically-private database search in cloud computing | |
Muhammad et al. | A secure data outsourcing scheme based on Asmuth–Bloom secret sharing | |
Zhou | Data security and integrity in cloud computing | |
Sammeta et al. | Medical data analytics for secure multi-party-primarily based cloud computing utilizing homomorphic encryption | |
US11907392B2 (en) | System and method utilizing function secret sharing with conditional disclosure of secrets | |
Chen et al. | BTMDS: Blockchain trusted medical data sharing scheme with privacy protection and access control | |
Carbunar et al. | Write-once read-many oblivious RAM | |
Almutairi et al. | Secure third‐party data clustering using SecureCL, Φ‐data and multi‐user order preserving encryption | |
Hadian Dehkordi et al. | Changeable essential threshold secret image sharing scheme with verifiability using bloom filter | |
Raja et al. | Dynamic Remote Data Auditing using Privacy-Preserving Auditing Protocol in Cloud Environment | |
Li et al. | Accelerating secure and verifiable data deletion in cloud storage via SGX and blockchain | |
Pandya | Bloom swizzlers for efficient keyword-based private information retrieval |