2014
DOI: 10.1007/978-3-319-08010-9_37
|View full text |Cite
|
Sign up to set email alerts
|

Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Encryption provides privacy and confidentiality, and avoid any data revealing by semi-trusted CSP or other users and outsiders [16]. Considering the real world scenarios where each data owner (personal or business data owner), encrypts his data with his key, as a result, outsourced data are encrypted with different keys, which makes impossible to compute over encrypted data [4].…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Encryption provides privacy and confidentiality, and avoid any data revealing by semi-trusted CSP or other users and outsiders [16]. Considering the real world scenarios where each data owner (personal or business data owner), encrypts his data with his key, as a result, outsourced data are encrypted with different keys, which makes impossible to compute over encrypted data [4].…”
mentioning
confidence: 99%
“…Additionally, the CSP could bypass access control to gain access to the stored data [1], which compromises data privacy. A Naive solution is to share a secret key among all users, which is not desirable because the most real world scenarios are non-interactive [4]. The approaches like Lopez et al [12] are impractical while they need to execute a light multi party computation to decrypt the results.…”
mentioning
confidence: 99%