Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis
I Amorim, I Costa - Mathematics, 2023 - mdpi.com
The widespread adoption of cloud infrastructures has revolutionized data storage and
access. However, it has also raised concerns regarding the privacy of sensitive data. To …
access. However, it has also raised concerns regarding the privacy of sensitive data. To …
A systematic literature review on sensitive data protection in blockchain applications
Since inception, blockchain has earned significant attention due to its exclusive
characteristics and advantages. It has changed the way the transactions are conducted by …
characteristics and advantages. It has changed the way the transactions are conducted by …
Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …
and efficient data transmission if business-to-business (B2B) methods were more widely …
A survey of public-key encryption with search functionality for cloud-assisted IoT
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
A searchable encryption scheme with biometric authentication and authorization for cloud environments
MI Mihailescu, SL Nita - Cryptography, 2022 - mdpi.com
Cloud computing offers the possibility of providing suitable access within a network for a set
of resources. Many users use different services for outsourcing their data within the cloud …
of resources. Many users use different services for outsourcing their data within the cloud …
A review of functional encryption in IoT applications
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …
and organizations, are likely to connect with others in their public and private interactions …
Public key encryption with keyword search in cloud: a survey
Y Zhou, N Li, Y Tian, D An, L Wang - Entropy, 2020 - mdpi.com
With the popularization of cloud computing, many business and individuals prefer to
outsource their data to cloud in encrypted form to protect data confidentiality. However, how …
outsource their data to cloud in encrypted form to protect data confidentiality. However, how …
Searchable encryption: A survey
D Sharma - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
We explore the field of searchable encryption (SE) and present a comprehensive survey of
relevant literature. Since the existing survey articles are primarily written for the security …
relevant literature. Since the existing survey articles are primarily written for the security …
Privacy‐Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario
B Wu, X Chen, Z Wu, Z Zhao, Z Mei… - … and Mobile Computing, 2021 - Wiley Online Library
The arrival of cloud computing age makes data outsourcing an important and convenient
application. More and more individuals and organizations outsource large amounts of graph …
application. More and more individuals and organizations outsource large amounts of graph …
A survey on public key encryption with keyword search: Taxonomy and methods
MH Noorallahzade, R Alimoradi… - International Journal of …, 2022 - Wiley Online Library
Given the many benefits that cloud computing brings, organizations tend to outsource most
of their data to reduce a large portion of their costs, but concern about the privacy of data is a …
of their data to reduce a large portion of their costs, but concern about the privacy of data is a …