+

Hahn et al., 2023 - Google Patents

Multi-key similar data search on encrypted storage with secure pay-per-query

Hahn et al., 2023

Document ID
14357492514674586005
Author
Hahn C
Yoon H
Hur J
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Many commercial cloud service providers (CSPs) adopt pay-per-query pricing models, in which data owners are charged based on the amount of data scanned by each query. In such a data sharing model, not only the privacy preservation for the data and queries but …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Ning et al. Passive attacks against searchable encryption
Pasupuleti et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
Li et al. Full verifiability for outsourced decryption in attribute based encryption
Chen et al. Dual-server public-key encryption with keyword search for secure cloud storage
Zhang et al. Secure ranked multi-keyword search for multiple data owners in cloud computing
Jarecki et al. Outsourced symmetric private information retrieval
Ng et al. Private data deduplication protocols in cloud storage
Wu et al. Verifiable public key encryption with keyword search based on homomorphic encryption in multi-user setting
Wang et al. Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage
Hahn et al. Multi-key similar data search on encrypted storage with secure pay-per-query
CN111447209A (en) Black box traceable ciphertext policy attribute-based encryption method
Xiangyang et al. MUSE: an efficient and accurate verifiable privacy‐preserving multikeyword text search over encrypted cloud data
Deng et al. Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data
Du et al. A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
Du et al. A Lightweight Blockchain‐based Public‐Key Authenticated Encryption with Multi‐Keyword Search for Cloud Computing
Zhang et al. Secdedup: Secure encrypted data deduplication with dynamic ownership updating
Tian et al. Lightweight searchable and equality-testable certificateless authenticated encryption for encrypted cloud data
Shen et al. Multi-keywords searchable attribute-based encryption with verification and attribute revocation over cloud data
Bai et al. Pairing-free public-key authenticated encryption with keyword search
Zhang et al. Privacy‐Preserving Attribute‐Based Keyword Search with Traceability and Revocation for Cloud‐Assisted IoT
Yang et al. Semantic searchable encryption scheme based on lattice in quantum-era
Strizhov et al. Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup.
Yang et al. Keyword searchable encryption scheme based on blockchain in cloud environment
Pillai et al. Blockchain-based searchable asymmetric encryption scheme in cloud environment
Zhou et al. A lattice‐based searchable encryption scheme with multi‐user authorization for the certificateless cloud computing environment
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载