Journal ArticleDOI
Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system
TLDR
Experimental results confirm that whenever the data scale grows, the improvement of MSMR retrieval efficiency is more significant.Abstract:
Most of the existing outsourced encrypted data schemes are retrieved based on the query keyword entered by authorised users. However, with the increase of the data scale in the cloud storage system...read more
Citations
More filters
Journal ArticleDOI
A novel blockchain-based privacy-preserving framework for online social networks
Shiwen Zhang,Shiwen Zhang,Tingting Yao,Voundi Koe Arthur Sandor,Tien-Hsiung Weng,Wei Liang,Jinshu Su +6 more
TL;DR: A novel blockchain-based privacy-preserving framework for online social networks, called BPP, based on blockchain and public key encryption with keyword search technique, which can achieve secure data sharing, data retrieving, and data accessing with fairness and without worrying about potential damage to users' interest is proposed.
Journal ArticleDOI
MOOCsChain: A Blockchain-Based Secure Storage and Sharing Scheme for MOOCs Learning
Dun Li,Danielle R. Gartner,Dezhi Han,Zibin Zheng,Tien-Hsiung Weng,Hongzhi Li,Han Liu,Arcangelo Castiglione,Kuan-Ching Li +8 more
TL;DR: In this article, the authors proposed a blockchain-based secure storage and sharing scheme for Electronic Learning Records (ELRs) in MOOCs learning systems, which can support efficient conditional anonymity, secure storage, and sharing without the need for sophisticated cryptographic calculations.
Journal ArticleDOI
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning
TL;DR: Wang et al. as mentioned in this paper proposed a blockchain-based secure storage and sharing scheme for Electronic Learning Records (ELRs) in MOOCs learning systems, which can support efficient conditional anonymity, secure storage, and sharing without the need for sophisticated cryptographic calculations.
Journal ArticleDOI
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
TL;DR: Existing schemes in the realm of mobile healthcare based on cloud and IoMT (Internet of Medical Things) do not ensure end-to-end security and are not compliant with HIPAA (Heal...
Journal ArticleDOI
A two-stage intrusion detection approach for software-defined IoT networks
TL;DR: A two-stage intrusion detection approach that can more intelligently detect attacks under SD-IoT networks is proposed, using the differential evolution algorithm's mutation mechanism to improve the firefly algorithm to solve the existing fireflies' problems.
References
More filters
Proceedings Article
An Information-Theoretic Definition of Similarity
TL;DR: This work presents an informationtheoretic definition of similarity that is applicable as long as there is a probabilistic model and demonstrates how this definition can be used to measure the similarity in a number of different domains.
Book ChapterDOI
Privacy preserving keyword searches on remote encrypted data
TL;DR: This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.
Journal ArticleDOI
Searchable symmetric encryption: Improved definitions and efficient constructions
TL;DR: This paper begins by reviewing existing notions of security and proposes new and stronger security definitions, and presents two constructions that show secure under these new definitions and are more efficient than all previous constructions.
Journal ArticleDOI
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
TL;DR: This paper proposes a basic idea for the MRSE based on secure inner product computation, and gives two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models and further extends these two schemes to support more search semantics.
Journal ArticleDOI
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.