Yin et al., 2023 - Google Patents
An attribute-based searchable encryption scheme for cloud-assisted IIoTYin et al., 2023
- Document ID
- 11748592261448148821
- Author
- Yin H
- Zhang W
- Deng H
- Qin Z
- Li K
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
The searchable encryption (SE) is a particular case of structured encryption, which has been intensively researched in the secure cloud storage system. By constructing a structured secure index, such as encrypted multimaps (EMMs), encrypted inverted index (EII), etc., SE …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yin et al. | An attribute-based searchable encryption scheme for cloud-assisted IIoT | |
| Miao et al. | Multi-authority attribute-based keyword search over encrypted cloud data | |
| Miao et al. | Lightweight fine-grained search over encrypted data in fog computing | |
| Miao et al. | Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage | |
| Gao et al. | Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain | |
| Chen et al. | A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks | |
| Li et al. | User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage | |
| Miao et al. | Hybrid keyword-field search with efficient key management for industrial internet of things | |
| Liang et al. | Searchable attribute-based mechanism with efficient data sharing for secure cloud storage | |
| Fan et al. | TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability | |
| Zhao et al. | Multi-user keyword search scheme for secure data sharing with fine-grained access control | |
| Wang et al. | Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage | |
| Li et al. | Two-factor data access control with efficient revocation for multi-authority cloud storage systems | |
| Huang et al. | Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted internet of things | |
| Zhou et al. | Privacy-preserved access control for cloud computing | |
| Tong et al. | Privacy-preserving boolean range query with temporal access control in mobile computing | |
| Li et al. | A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search | |
| Li et al. | Secure and temporary access delegation with equality test for cloud-assisted IoV | |
| Yin et al. | An attribute-based keyword search scheme for multiple data owners in cloud-assisted industrial Internet of Things | |
| Cao et al. | Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control | |
| Deng et al. | Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data | |
| Fu et al. | A practical attribute-based document collection hierarchical encryption scheme in cloud computing | |
| Zhang et al. | Secure and efficient searchable public key encryption for resource constrained environment based on pairings under prime order group | |
| Yin et al. | A privacy-preserving and identity-based personalized recommendation scheme for encrypted tasks in crowdsourcing | |
| Yin et al. | Practical and dynamic attribute-based keyword search supporting numeric comparisons over encrypted cloud data |