2021
DOI: 10.1016/j.future.2021.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…File injection attacks [20] can destroy encrypted systems when an SSE scheme lacks forward privacy. Owing to the need for and importance of accommodating multiple users in some systems, several schemes have been developed with the aim of addressing this requirement, as documented in [23,24,29]. The constructions outlined in these articles employed asymmetric encryption techniques, resulting in elevated computational costs during search and decryption processes.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations
“…File injection attacks [20] can destroy encrypted systems when an SSE scheme lacks forward privacy. Owing to the need for and importance of accommodating multiple users in some systems, several schemes have been developed with the aim of addressing this requirement, as documented in [23,24,29]. The constructions outlined in these articles employed asymmetric encryption techniques, resulting in elevated computational costs during search and decryption processes.…”
Section: Previous Workmentioning
confidence: 99%
“…The SSMDO [23] and Naja f i [24] share similarities with our proposed approach in terms of achieving privacy for multiple users, and we, therefore, compared the execution times of these algorithms. This comparison included evaluating the time taken for index generation, client storage, and the search process.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…There are different data encryption schemes in the literature designed for the application of data outsourcing. Orderpreserving encryption (OPE) schemes [1,2] and searchable encryption schemes [3][4][5] are developed to perform, respectively, range queries and keyword search queries at the server side efficiently. Partially homomorphic encryption schemes [6,7] are designed to support a limited number of operations on the ciphertexts.…”
Section: Introductionmentioning
confidence: 99%