2019
DOI: 10.1007/s11390-019-1903-2
|View full text |Cite
|
Sign up to set email alerts
|

Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 40 publications
0
18
0
Order By: Relevance
“…The above table provides the searching time results in seconds for various number of queries. The searching time of proposed ABE is compared with various existing techniques namely HABE [14], TFS [15], PCDD [18] and SII [19] and their validated results are presented in the graphical structure, which is shown in Figure 3. Figure 3 shows that the proposed ABE-based search technique searches the queries in less number of time.…”
Section: Performance Evaluation Of Proposed Abe Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The above table provides the searching time results in seconds for various number of queries. The searching time of proposed ABE is compared with various existing techniques namely HABE [14], TFS [15], PCDD [18] and SII [19] and their validated results are presented in the graphical structure, which is shown in Figure 3. Figure 3 shows that the proposed ABE-based search technique searches the queries in less number of time.…”
Section: Performance Evaluation Of Proposed Abe Methodsmentioning
confidence: 99%
“…In this section, a review of recent techniques namely encryption techniques, access control solution and disclosure discovery methods based on privacy-preservation of end user tare presented in [14][15][16][17][18][19][20].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, in order to protect its privacy and security, special attention must be paid to the use and storage process. With the continuous development of cloud storage technology, this security measure is particularly important [1]. At present, the front-end encryption of speech is one of the methods to protect speech security in cloud storage environment.…”
Section: Introductionmentioning
confidence: 99%