2022
DOI: 10.3390/cryptography6010008
|View full text |Cite
|
Sign up to set email alerts
|

A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments

Abstract: Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources involved. One of the biggest concerns is represented by storing sensitive data on remote servers, which can be found to be extremely challenging within different situations related to privacy. Searchable Encryption (SE) represents a particular case of Fully Homomorph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 51 publications
(43 reference statements)
0
11
0
Order By: Relevance
“…This article [28] proposed an encryption system based on biometric authentication, user authentication and a searchable encryption scheme. According to the authors, If these components are combined, the data can be accessed in the document without decrypting and searched by keywords and only that data can be displayed, which will match with keywords.…”
Section: Problem Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…This article [28] proposed an encryption system based on biometric authentication, user authentication and a searchable encryption scheme. According to the authors, If these components are combined, the data can be accessed in the document without decrypting and searched by keywords and only that data can be displayed, which will match with keywords.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The problem with this algorithm is that If the attacker gets this decryption key, it will be easier for the attacker to develop a decyption mechanism. In 2022 [28], the authors introduced an authentication technique by combining two-factor authentication and a searchable encryption mechanism. After performing different experiments and discussing that correct results would be displayed in searchable encryption when users search by using keywords.…”
Section: Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Capture and matching operations: If a non‐match or possibly ambiguous result is produced, a willing subject may be required to submit the same biometric data, a new biometric sample, or take additional action, such as calling a safety officer to complete a manual standby technique, for an interim window of scores by Mihailescu and Nita 8 . If identification is the goal, the test values are given to a section or valuable reference material.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Searchable encryption (SE) is an encryption technique that allows search operations over encrypted data. SE can either be searchable symmetric encryption (SSE) or Public-Key Searchable Encryption (PKSE) [65]. SE can be used to preserve privacy in digital forensics by allowing caserelevant keywords to be searched over encrypted evidential information, without direct access to suspect personal information.…”
Section: Searchable Encryptionmentioning
confidence: 99%