2018
DOI: 10.1109/access.2018.2828404
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 42 publications
(30 citation statements)
references
References 30 publications
0
30
0
Order By: Relevance
“…Encryption is a classic and effective way to secure sensitive user data, which has been investigated for a long time. In [5], Peng T. et al brought forth a multi-keywords sortingbased secure search method, which adopt the symmetric public key search encryption way to permit a user to make secure information retrieval in an encrypted dataset based on multiple keywords. The advantage is that it realizes secure service protection for cloud computing with limited resources.…”
Section: A Encryptionmentioning
confidence: 99%
“…Encryption is a classic and effective way to secure sensitive user data, which has been investigated for a long time. In [5], Peng T. et al brought forth a multi-keywords sortingbased secure search method, which adopt the symmetric public key search encryption way to permit a user to make secure information retrieval in an encrypted dataset based on multiple keywords. The advantage is that it realizes secure service protection for cloud computing with limited resources.…”
Section: A Encryptionmentioning
confidence: 99%
“…To address the three challenges, we propose a Secure and Efficient Spatial Task Matching scheme (SESTM). We firstly adopt multi-user searchable encryption [17], [22] to preserve the location privacy, whereby the differences from previous works are that we improve query efficiency and achieve user revocation. Then, we design a tree-based index based on segment tree [13], [19], [23] to realize high matching efficiency, and the differences from previous schemes are that we reduce the query time complexity from O(n) to O(logn).…”
Section: ) Multi-user Searchable Encryption Technique Is a Generalmentioning
confidence: 99%
“…Proof: Since our encryption scheme is based on PRMSM [17] and TBMSM [22], thus the security analysis of SESTM is similar as PRMSM and TBMSM, which ensures that no additional information except the ciphertexts will be leaked to adversaries. This proof process can be referred to the Theorem 1 and Theorem 2 in TBMSM.…”
Section: G Security Analysismentioning
confidence: 99%
“…Tianyue et al suggested a secured search protocol that permits disparate DO to encrypt the files and indexes with disparate keys. Without knowing DO, the privacy‐preserving search protocol permits the CS to execute the secured MKRS.…”
Section: Related Workmentioning
confidence: 99%