Secure and Efficient Adjacency Search Supporting Synonym Query on Encrypted Graph in the Cloud
نویسندگان
چکیده
منابع مشابه
Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup
Searchable encryption allows one to store encrypted documents on a remote honest-butcurious server, and query that data at the server itself without requiring the documents to be decrypted prior to searching. This not only protects the data from the prying eyes of the server, but can also reduce the communication overhead between the server and the user and local processing at the latter. Previ...
متن کاملA query privacy-enhanced and secure search scheme over encrypted data in cloud computing
Article history: Received 17 December 2015 Received in revised form 4 December 2016 Accepted 16 December 2016 Available online xxxx
متن کاملAn Efficient and Secure Multi Keyword Search in Encrypted Cloud Data with Ranking
As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based on plaintext keyword search. Considering the large number of data users...
متن کاملSecure Count Query on Encrypted Genomic Data
Human genomic information can yield more effective healthcare by guiding medical decisions. Therefore, genomics research is gaining popularity as it can identify potential correlations between a disease and a certain gene, which improves the safety and efficacy of drug treatment and can also develop more effective prevention strategies [1]. To reduce the sampling error and to increase the stati...
متن کاملAchieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to sav...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2941648