2020
DOI: 10.1109/jiot.2020.2964412
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…The Internet of Things (IoT), for example, is an emerging technology that represents an innovative solution allowing the connection of billions of physical devices in the digital world using various networks with heterogeneous objects [3,4]. Thus, data retrieved from the web is tainted with [5] errors and uncertainties and may, therefore, contain contradictions resulting from inherently uncertain processes, such as data integration and / or extraction. These uncertainties arise from different sources, such as minor differences in measurements of physical events or different information provided describing the same entity.…”
Section: Introductionmentioning
confidence: 99%
“…The Internet of Things (IoT), for example, is an emerging technology that represents an innovative solution allowing the connection of billions of physical devices in the digital world using various networks with heterogeneous objects [3,4]. Thus, data retrieved from the web is tainted with [5] errors and uncertainties and may, therefore, contain contradictions resulting from inherently uncertain processes, such as data integration and / or extraction. These uncertainties arise from different sources, such as minor differences in measurements of physical events or different information provided describing the same entity.…”
Section: Introductionmentioning
confidence: 99%
“…However, ensuring the security of images-in-transit and images-at-rest is challenging. In order to solve the security problem of private images, symmetric or public-key cryptography encryption images, which needs a key, are often used [1][2][3]. If the key is lost or the encrypted image is damaged, the secret information cannot be recovered.…”
Section: Introductionmentioning
confidence: 99%
“…However, in reality, the threshold value must be adjusted when the security policy or the adversary model changes. Here, we describe three example situations in which (1) the importance of the secret information must be changed, (2) some participants have left or joined the system, and (3) attackers have obtained one or more secret shares.…”
Section: Introductionmentioning
confidence: 99%
“…The literature of searchable encryption (SE) schemes contains a broad variety of schemes viz., search over multi‐modal data [36 ], ranked search over encrypted data [37 ], search encrypted data in the IIoT [38 ], certificate less SE scheme to provide security against key‐escrow problem [39 ]. However, none of the existing SE schemes supports the delegation of search rights over selected encrypted data using a constant size key.…”
Section: Introductionmentioning
confidence: 99%