2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7996810
|View full text |Cite
|
Sign up to set email alerts
|

Towards trustworthy and private keyword search in encrypted decentralized storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…An alternative to querying patient data off-chain is to search the distributed encrypted data directly in a decentralized manner. The authors in [35] have proposed an encrypted decentralized storage architecture that supports keyword searching to prevent returning the malicious results. A downside of implementing such a technique is the requirement of establishing a new storage architecture that can add complexity to the solution.…”
Section: E Interactions and Message Sequencementioning
confidence: 99%
“…An alternative to querying patient data off-chain is to search the distributed encrypted data directly in a decentralized manner. The authors in [35] have proposed an encrypted decentralized storage architecture that supports keyword searching to prevent returning the malicious results. A downside of implementing such a technique is the requirement of establishing a new storage architecture that can add complexity to the solution.…”
Section: E Interactions and Message Sequencementioning
confidence: 99%
“…The user-end includes the client machine, often in the form of a thin-client (eg, smart phone or tablet) with limited computational power. 78 The system proposed by Cai et al 78 utilizes crypto-currencies and cryptographic incremental hashing to solve the mentioned concerns. An edge computing paradigm can be utilized to bypass this bottleneck.…”
Section: Edge Computing For Searchable Encryptionmentioning
confidence: 99%
“…Lei et al [147] proposed a new key management scheme for key transfer between security managers in a heterogeneous VCS (vehicular communication system) network, realizing secure transmission of the key by introducing block-chain technology. Furthermore, Cai et al [148] proposed a trustworthy and private keyword search in encrypted decentralized storage to protect files and query confidentiality, while minimizing search latency.…”
Section: Block-chain Technologymentioning
confidence: 99%