+

Yin et al., 2017 - Google Patents

Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data

Yin et al., 2017

View PDF
Document ID
14216358300402135473
Author
Yin H
Qin Z
Zhang J
Ou L
Li K
Publication year
Publication venue
IEEE transactions on cloud computing

External Links

Snippet

Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy- preserving manner. However, in practice, the returned query results may be incorrect or …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content

Similar Documents

Publication Publication Date Title
Zhang et al. An efficient blockchain-based hierarchical data sharing for healthcare internet of things
Lu et al. Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices
Miao et al. Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage
Miao et al. Privacy-preserving attribute-based keyword search in shared multi-owner setting
Miao et al. Multi-authority attribute-based keyword search over encrypted cloud data
Chen et al. Dual-server public-key encryption with keyword search for secure cloud storage
Zhang et al. Multi-keyword searchable and verifiable attribute-based encryption over cloud data
Chaudhari et al. Privacy preserving searchable encryption with fine-grained access control
Wang et al. Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
Yang et al. Multi-user multi-keyword rank search over encrypted data in arbitrary language
Zheng et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Yin et al. Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
Dong et al. Shared and searchable encrypted data for untrusted servers
Liang et al. Privacy-preserving and regular language search over encrypted cloud data
Chen et al. Blockchain‐Enabled Public Key Encryption with Multi‐Keyword Search in Cloud Computing
Miao et al. Threshold multi-keyword search for cloud-based group data sharing
Xu et al. Authorized keyword searches on public key encrypted data with time controlled keyword privacy
Cao et al. Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
CN114021164A (en) Privacy protection method of credit information system based on blockchain
Han et al. TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage
Zhang et al. Secure and efficient searchable public key encryption for resource constrained environment based on pairings under prime order group
Meng et al. TSR-ABE: Traceable and server-aided revocable ciphertext-policy attribute-based encryption under static assumptions
Zhou et al. EVSS: An efficient verifiable search scheme over encrypted cloud data
Li et al. Decentralized threshold signatures with dynamically private accountability
Liu et al. Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载