Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for providing fine-grained data access control in the cloud. Researchers have also taken their advantages to present searchable encryption schemes based on ABE and have achieved significant results. However, most of the existing key word search schemes based on ABE lack the properties of key exposure protection and highly efficient key updating when key leakage happens. To better tackle these problems, we present a key insulated attribute-based data retrieval scheme with key word search (KI-ABDR-KS) for multi-tenant architecture. In our scheme, a data owner can make a self-centric access policy of the encrypted data. Only when the possessing attribu...
(g) Search time for 10 keywords (h) Search time for 20 keywords (i) Search time for 30 keywords.</p
The emergence of cloud infrastructure has significantly reduced the costs of hardware and software r...
The way services offered by cloud computing gets its unprecedented and undisputed popularity, so its...
We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute r...
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primit...
Searchable Encryption (SE) is an important technique to guarantee data security and usability in the...
To protect data security and privacy in cloud storage systems, a common solution is to outsource dat...
<div><p>Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryptio...
With the development of outsourcing data services, data security has become an urgent problem that n...
Searchable Encryption (SE) is a crucial technique for cloud data security and usability (SE). When e...
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data...
© 1983-2012 IEEE. Cloud computing is a model for convenient, on-demand network access to virtualized...
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keywor...
At present, with the popularity of Internet of things (IoT), a huge number of datasets generated by ...
Keyword search on encrypted data allows one to issue the search token and conduct search operations ...
(g) Search time for 10 keywords (h) Search time for 20 keywords (i) Search time for 30 keywords.</p
The emergence of cloud infrastructure has significantly reduced the costs of hardware and software r...
The way services offered by cloud computing gets its unprecedented and undisputed popularity, so its...
We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute r...
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primit...
Searchable Encryption (SE) is an important technique to guarantee data security and usability in the...
To protect data security and privacy in cloud storage systems, a common solution is to outsource dat...
<div><p>Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryptio...
With the development of outsourcing data services, data security has become an urgent problem that n...
Searchable Encryption (SE) is a crucial technique for cloud data security and usability (SE). When e...
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data...
© 1983-2012 IEEE. Cloud computing is a model for convenient, on-demand network access to virtualized...
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keywor...
At present, with the popularity of Internet of things (IoT), a huge number of datasets generated by ...
Keyword search on encrypted data allows one to issue the search token and conduct search operations ...
(g) Search time for 10 keywords (h) Search time for 20 keywords (i) Search time for 30 keywords.</p
The emergence of cloud infrastructure has significantly reduced the costs of hardware and software r...
The way services offered by cloud computing gets its unprecedented and undisputed popularity, so its...