Yin et al., 2017 - Google Patents
Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud dataYin et al., 2017
View PDF- Document ID
- 14216358300402135473
- Author
- Yin H
- Qin Z
- Zhang J
- Ou L
- Li K
- Publication year
- Publication venue
- IEEE transactions on cloud computing
External Links
Snippet
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy- preserving manner. However, in practice, the returned query results may be incorrect or …
- 238000000034 method 0 abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | An efficient blockchain-based hierarchical data sharing for healthcare internet of things | |
| Lu et al. | Lightweight public key authenticated encryption with keyword search against adaptively-chosen-targets adversaries for mobile devices | |
| Miao et al. | Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage | |
| Miao et al. | Privacy-preserving attribute-based keyword search in shared multi-owner setting | |
| Miao et al. | Multi-authority attribute-based keyword search over encrypted cloud data | |
| Chen et al. | Dual-server public-key encryption with keyword search for secure cloud storage | |
| Zhang et al. | Multi-keyword searchable and verifiable attribute-based encryption over cloud data | |
| Chaudhari et al. | Privacy preserving searchable encryption with fine-grained access control | |
| Wang et al. | Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud | |
| Yang et al. | Multi-user multi-keyword rank search over encrypted data in arbitrary language | |
| Zheng et al. | VABKS: Verifiable attribute-based keyword search over outsourced encrypted data | |
| Yin et al. | Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data | |
| Dong et al. | Shared and searchable encrypted data for untrusted servers | |
| Liang et al. | Privacy-preserving and regular language search over encrypted cloud data | |
| Chen et al. | Blockchain‐Enabled Public Key Encryption with Multi‐Keyword Search in Cloud Computing | |
| Miao et al. | Threshold multi-keyword search for cloud-based group data sharing | |
| Xu et al. | Authorized keyword searches on public key encrypted data with time controlled keyword privacy | |
| Cao et al. | Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control | |
| CN114021164A (en) | Privacy protection method of credit information system based on blockchain | |
| Han et al. | TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage | |
| Zhang et al. | Secure and efficient searchable public key encryption for resource constrained environment based on pairings under prime order group | |
| Meng et al. | TSR-ABE: Traceable and server-aided revocable ciphertext-policy attribute-based encryption under static assumptions | |
| Zhou et al. | EVSS: An efficient verifiable search scheme over encrypted cloud data | |
| Li et al. | Decentralized threshold signatures with dynamically private accountability | |
| Liu et al. | Verifiable attribute-based keyword search encryption with attribute revocation for electronic health record system |