2021
DOI: 10.3390/app112412040
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight, Secure, Similar-Document Retrieval over Encrypted Data

Abstract: Applications for document similarity detection are widespread in diverse communities, including institutions and corporations. However, currently available detection systems fail to take into account the private nature of material or documents that have been outsourced to remote servers. None of the existing solutions can be described as lightweight techniques that are compatible with lightweight client implementation, and this deficiency can limit the effectiveness of these systems. For instance, the discover… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…In terms of scalability, the cloud facilitates smooth joining of new nodes to existing computing clusters so as to boost their computing power. This serves to enhance both reliability and efficiency [15]. Despite the cost reductions and increased efficiency, the high number of intelligent IoT devices that must be supported have led to increased latencies, security and privacy violations [16], [17].…”
Section: Figure 1 Iot-cloud Environmentmentioning
confidence: 99%
“…In terms of scalability, the cloud facilitates smooth joining of new nodes to existing computing clusters so as to boost their computing power. This serves to enhance both reliability and efficiency [15]. Despite the cost reductions and increased efficiency, the high number of intelligent IoT devices that must be supported have led to increased latencies, security and privacy violations [16], [17].…”
Section: Figure 1 Iot-cloud Environmentmentioning
confidence: 99%
“…To address this challenge, many schemes have been put forward in [53]- [58]. However, most of these schemes are not lightweight [59] and cannot offer forward secrecy, untraceability as well as resilience against key compromise and impersonation attacks [1], [60]. For instance, the scheme [57] incurs extremely high communication costs.…”
Section: Related Workmentioning
confidence: 99%
“…Standard cryptographic approaches such as transport layer security (TLS) and secure socket layer (SSL) can also be utilized to enhance privacy and security in smart cities. However, these approaches are quite expensive for resource-constrained IoT devices [110]. This challenge can be addressed by lightweight key-establishment mechanisms based on symmetric encryption in [111].…”
Section: Related Workmentioning
confidence: 99%