Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client side before outsourcing it to the remote cloud storage server. However, once the d...
| Main Authors: | Salam, M., Yau, W., Chin, J., Heng, S., Ling, Huo Chong, Phan, R., Poh, G., Tan, S., Yap, W. |
|---|---|
| Format: | Journal Article |
| Published: |
springer berlin
2015
|
| Online Access: | http://hdl.handle.net/20.500.11937/19937 |
Similar Items
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al.
by: Jaber, Aws Naser, et al.
Implementing Privacy-Preserving Record Linkage in a Cloud
Computing Environment
by: Brown, Adrian Paul
Published: (2021)
by: Brown, Adrian Paul
Published: (2021)
Weight-adjustable ranking for keyword search in
relational satabases
by: Jou, Chichang., et al.
Published: (2018)
by: Jou, Chichang., et al.
Published: (2018)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
User assisted keyword search on RSS synthesizer for relevant weblogs
by: Teh, Phoey Lee, et al.
Published: (2009)
by: Teh, Phoey Lee, et al.
Published: (2009)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Cognitive privacy for personal clouds
by: Radenkovic, Milena
Published: (2016)
by: Radenkovic, Milena
Published: (2016)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
A Comparison of Statistical Linkage Keys with Bloom Filter-based Encryptions for Privacy-preserving Record Linkage using Real-world Mammography Data
by: Schnell, R., et al.
Published: (2017)
by: Schnell, R., et al.
Published: (2017)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
Privacy preserving for electronic health record systems
by: Yussuf, Zakariye Mohamed
Published: (2019)
by: Yussuf, Zakariye Mohamed
Published: (2019)
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
by: Mohd Satar, Siti Dhalila, et al.
Published: (2021)
Throw & throws keyword
by: Khowaja, Kamran, et al.
Published: (2011)
by: Khowaja, Kamran, et al.
Published: (2011)
More on const keywords
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Static: the multipurpose keyword
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Generalised impossible differentials of advanced encryption standard
by: Phan, R.C.W., et al.
Published: (2001)
by: Phan, R.C.W., et al.
Published: (2001)
Enhancing the searchability of page-image PDF documents using an aligned hidden layer from a truth text
by: Knight, Ian A., et al.
Published: (2016)
by: Knight, Ian A., et al.
Published: (2016)
Estimating parameters for probabilistic linkage of privacy-preserved datasets.
by: Brown, A., et al.
Published: (2017)
by: Brown, A., et al.
Published: (2017)
A Framework For Privacy Diagnosis And
Preservation In Data Publishing
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
by: Mirakabad, Mohammad Reza Zare
Published: (2010)
Keyword indexing and searching tool (KIST): a tool to assist the forensics analysis of whatsapp chat
by: Shahrol Nizam, Syafiqah Hanisah, et al.
Published: (2020)
by: Shahrol Nizam, Syafiqah Hanisah, et al.
Published: (2020)
A Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage
by: Vidanage, Anushka, et al.
Published: (2020)
by: Vidanage, Anushka, et al.
Published: (2020)
Encrypted quick response scheme for hotel check-in and access control system
by: Cheong, S., et al.
Published: (2017)
by: Cheong, S., et al.
Published: (2017)
Privacy preserving linkage using multiple dynamic match keys
by: Randall, Sean, et al.
Published: (2019)
by: Randall, Sean, et al.
Published: (2019)
Application of privacy-preserving techniques in operational record linkage centres
by: Boyd, James, et al.
Published: (2015)
by: Boyd, James, et al.
Published: (2015)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Privacy-preserving record linkage on large real world datasets
by: Randall, Sean, et al.
Published: (2014)
by: Randall, Sean, et al.
Published: (2014)
Privacy Preserving Minutia-Based Fingerprint Template Protection Techiniques
by: Jin, Zhe
Published: (2015)
by: Jin, Zhe
Published: (2015)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Symmetric encryption using preshared public parameters for a secure TFTP protocol / Nur Nabila Mohamed
by: Mohamed, Nur Nabila
Published: (2015)
by: Mohamed, Nur Nabila
Published: (2015)
Similar Items
-
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008) -
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021) -
Privacy Concerns due to Class Elements in Cloud Environments despite Full Homomorphic Encryption
by: Jaber, Aws Naser, et al. -
Implementing Privacy-Preserving Record Linkage in a Cloud
Computing Environment
by: Brown, Adrian Paul
Published: (2021) -
Weight-adjustable ranking for keyword search in
relational satabases
by: Jou, Chichang., et al.
Published: (2018)