scispace - formally typeset
Journal ArticleDOI

Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system

TLDR
Experimental results confirm that whenever the data scale grows, the improvement of MSMR retrieval efficiency is more significant.
Abstract
Most of the existing outsourced encrypted data schemes are retrieved based on the query keyword entered by authorised users. However, with the increase of the data scale in the cloud storage system...

read more

Citations
More filters
Journal ArticleDOI

A novel blockchain-based privacy-preserving framework for online social networks

TL;DR: A novel blockchain-based privacy-preserving framework for online social networks, called BPP, based on blockchain and public key encryption with keyword search technique, which can achieve secure data sharing, data retrieving, and data accessing with fairness and without worrying about potential damage to users' interest is proposed.
Journal ArticleDOI

MOOCsChain: A Blockchain-Based Secure Storage and Sharing Scheme for MOOCs Learning

TL;DR: In this article, the authors proposed a blockchain-based secure storage and sharing scheme for Electronic Learning Records (ELRs) in MOOCs learning systems, which can support efficient conditional anonymity, secure storage, and sharing without the need for sophisticated cryptographic calculations.
Journal ArticleDOI

MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning

TL;DR: Wang et al. as mentioned in this paper proposed a blockchain-based secure storage and sharing scheme for Electronic Learning Records (ELRs) in MOOCs learning systems, which can support efficient conditional anonymity, secure storage, and sharing without the need for sophisticated cryptographic calculations.
Journal ArticleDOI

A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic

TL;DR: Existing schemes in the realm of mobile healthcare based on cloud and IoMT (Internet of Medical Things) do not ensure end-to-end security and are not compliant with HIPAA (Heal...
Journal ArticleDOI

A two-stage intrusion detection approach for software-defined IoT networks

TL;DR: A two-stage intrusion detection approach that can more intelligently detect attacks under SD-IoT networks is proposed, using the differential evolution algorithm's mutation mechanism to improve the firefly algorithm to solve the existing fireflies' problems.
References
More filters
Proceedings Article

An Information-Theoretic Definition of Similarity

Dekang Lin
TL;DR: This work presents an informationtheoretic definition of similarity that is applicable as long as there is a probabilistic model and demonstrates how this definition can be used to measure the similarity in a number of different domains.
Book ChapterDOI

Privacy preserving keyword searches on remote encrypted data

TL;DR: This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.
Journal ArticleDOI

Searchable symmetric encryption: Improved definitions and efficient constructions

TL;DR: This paper begins by reviewing existing notions of security and proposes new and stronger security definitions, and presents two constructions that show secure under these new definitions and are more efficient than all previous constructions.
Journal ArticleDOI

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

TL;DR: This paper proposes a basic idea for the MRSE based on secure inner product computation, and gives two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models and further extends these two schemes to support more search semantics.
Journal ArticleDOI

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.
Related Papers (5)