A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability
[chapter]
2015
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Although the existing searchable encryption schemes enable users to search over encrypted data, these schemes support only exact keyword search, which greatly affects data usability. ...
Moreover, these schemes do not support verifiability of search result. ...
In recent years, various efficient search schemes over encrypted cloud data based on searchable encryption have been proposed. ...
doi:10.1007/978-3-319-23829-6_4
fatcat:sjopp55arzaelmv3lwx7lcwlhe
Searching Techniques over Encrypted Cloud Data
2019
International Journal of Computer Applications
This study focuses on different searching techniques over the encrypted data in cloud. ...
Nowadays, large amount of data can be stored in the cloud. To preserve the secrecy of the data, the data must be encrypted. ...
Many schemes have been proposed in keyword searching on encrypted data in cloud computing. Based on the related work, we can analyze searching techniques over encrypted data in five major groups, 1. ...
doi:10.5120/ijca2019918676
fatcat:xhtgrgaqbnhqllebjady6xddiy
Survey on Keyword Search in Encrypted Data With Privacy Preservation
2016
International Journal of Science and Research (IJSR)
Cloud computing is an on-demand computing. It is an Internet-based computing. In this area shared resources, data and information are provided on demand to computers and other devices. ...
In this paper, we investigate the idea behind single keyword search over encrypted data and also multi keyword ranking. ...
It supports the privacy and functional requirements. This scheme does not support public key based searchable encryption. Wei Zhou et al. [6] proposed K-gram based fuzzy keyword Ranked Search. ...
doi:10.21275/v5i1.nov153041
fatcat:sh5vdcxzv5hzzcejyvhpwo627i
Split keyword fuzzy and synonym search over encrypted cloud data
2017
Multimedia tools and applications
Extensive experimental results on real-time data sets shows, the proposed solution is effective and efficient for multi-keyword ranked search and synonym queries Fuzzy based search over encrypted cloud ...
The encrypted data is search based on keywords and retrieve interested files by data user using a lot of traditional Search scheme. ...
Further, we would like to explore semantic based search over encrypted cloud data and search for images using image information. ...
doi:10.1007/s11042-017-5055-5
fatcat:goo2nxshencblikdulfgvxkpt4
Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query
2014
IEEE transactions on consumer electronics
Meanwhile, existing search approaches over encrypted cloud data support only exact or fuzzy keyword search, but not semantics-based multi-keyword ranked search. ...
This paper proposes an effective approach to solve the problem of multi-keyword ranked search over encrypted cloud data supporting synonym queries. ...
Hence, it is an especially important thing to explore an effective search service over encrypted outsourced data. ...
doi:10.1109/tce.2014.6780939
fatcat:howmjads7ncx7cbsyikryrkmb4
A MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED BASED ON HIERARCHICAL CLUSTERING INDEX
2017
International Journal on Smart Sensing and Intelligent Systems
In this project, present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to ...
But few of the dynamic schemes This paper proposes a secure tree-based search scheme over the encrypted cloud data, which supports multi-keyword ranked search and dynamic operation on the document collection ...
doi:10.21307/ijssis-2017-269
fatcat:rg7oynvtqre7hb2vxtjsl6dpn4
Fulfilling Secure, General, and Fine-Grained Question happen Affirmation for Secure Interest Plot over Mixed Cloud Data
2019
International Journal for Research in Applied Science and Engineering Technology
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. ...
We achieve the goal by constructing secure verification object for encrypted cloud data. ...
query scheme over encrypted cloud data based on attribute-based encryption technique (abe) in the public-key setting .referred to the merkle hash tree and applied pairing operations to implement the correctness ...
doi:10.22214/ijraset.2019.4533
fatcat:ym3whe6dy5eetirynm5343qin4
Synonymous Keyword Search Over Encrypted Data in Cloud
2017
International Journal of MC Square Scientific Research
To support dynamic update operations such as deletion and insertion process, a secure multi-keyword ranked search scheme over encrypted cloud data is produced. ...
Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. ...
Wildcard-based Fuzzy Set Construction (WFSC): This scheme to enable fuzzy keyword search over encrypted cloud data. ...
doi:10.20894/ijmsr.117.009.002.004
fatcat:o2xtbbbv3vf5jd5gjyhdk4dgna
Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing
[article]
2012
arXiv
pre-print
We further propose a brand new symbol-based trie-traverse searching scheme, where a multi-way tree structure is built up using symbols transformed from the resulted fuzzy keyword sets. ...
We exploit edit distance to quantify keywords similarity and develop two advanced techniques on constructing fuzzy keyword sets, which achieve optimized storage and representation overheads. ...
fuzzy keyword search over encrypted cloud data. ...
arXiv:1211.3682v1
fatcat:zjmz3pne6zdszfymzfkwq5pntm
Secure Ranked Multi-Keyword Search based on Modified Blowfish Algorithm and AVL Tree in Untrusted Cloud Environment
2019
International Journal of Engineering and Advanced Technology
To achieve a proficient search, every data owner's index based on AVL tree is encrypted by way of additive order and the privacy-preserving family is formed. ...
In this paper, ranked multi keyword search based on AVL tree, especially for several data owners, has been proposed. ...
Ranked multi keyword search over encrypted data in the cloud is introduced on the basis of two threat models. ...
doi:10.35940/ijeat.a2041.109119
fatcat:jom2eqwnafhvxdyd27cf7bh3hq
FSSE: An effective fuzzy semantic searchable encryption scheme over encrypted cloud data
2020
IEEE Access
In this paper, we propose an effective fuzzy semantic searchable encryption scheme (FSSE) that supports multi-keyword search over encrypted data in cloud computing. ...
The existing research mainly focuses on keyword-based search schemes, most of which support the exact matching of keywords. ...
[28] , [29] proposed a content-based search scheme that implements an effective search for semantic perception on encrypted data. ...
doi:10.1109/access.2020.2966367
fatcat:orkkgtizl5antctrbnaba2bw7i
A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering
2016
INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY
In previous system, single keyword or Boolean keyword search is provided over an encrypted data. MRSE is the multi keyword ranked searching technique for efficient searching over an encrypted data. ...
Before outsourcing of data on cloud user encrypt it as per security concern. Other users can use cloud data by downloading and decrypting it from cloud. ...
MRSE-HCI is multi-keyword ranked search over encrypted data based on hierarchical clustering index. In MRSE-HCI, search time is increases linearly as aggressive growing size of data collection. ...
doi:10.18535/ijetst/v3i12.11
fatcat:vxificufy5d2ppara3uydpjanq
A Light Weight Cryptographic Technique for Secure Outsourcing and Retrieval of Data in Cloud Computing
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
It is still an open challenge to develop light weight cryptographic methods for secure storage and retrieval or search for outsourced encrypted data. ...
An algorithm named Hybrid Lightweight Data Encryption (HLDE) is proposed and implemented. Empirical study is made on the same to validate our approach. ...
The proposed [29] proposed a fully homomorphic encryption scheme based on Merkle tree in order to have secure and lightweight search over public cloud. ...
doi:10.35940/ijitee.j1073.0881019
fatcat:rjret5kfh5bwdfoipqn34tnksm
Multi Keyword Search on Encrypted Data with Ranking
2021
International Journal for Research in Applied Science and Engineering Technology
This will make it significantly more difficult to create cipher text search schemes capable of providing efficient and reliable online information retrieval on large quantities of encrypted data. ...
The paper proposes a hierarchical clustering approach in order to accommodate additional search semantics and to satisfy the demand for fast cipher text search in a big data environment. ...
Problem Statement Multiple keyword searches over cypher text was not possible with a searchable encryption scheme that applied to encrypted data stored on the cloud. ...
doi:10.22214/ijraset.2021.36672
fatcat:7tb2uvliq5e7rirdfvtnuobmei
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data
[article]
2018
arXiv
pre-print
To address the above issues, ESAS, an Efficient Semantic and Authorized Search scheme over encrypt-ed outsourced data, is proposed. ...
In ESAS, by integrating PRSCG (the privacy-preserving ranked search based on con-ceptual graph) and CP-ABE (ciphertext policy attribute-based encryption), semantic search with file-level fine-grained access ...
ACKNOWLEDGMENT This work is supported by Beijing Natural Science Foundation under grant 4182060. The corresponding author is Zhitao Guan. ...
arXiv:1811.06917v1
fatcat:ruscqxjdr5c7dkfm4y7l26z5aa
« Previous
Showing results 1 — 15 out of 1,627 results