Zobrazeno 1 - 10
of 204
pro vyhledávání: '"multi-keyword search"'
Autor:
Uma Sankararao Varri, Debjani Mallick, Ashok Kumar Das, M. Shamim Hossain, Youngho Park, Joel J.P.C. Rodrigues
Publikováno v:
Alexandria Engineering Journal, Vol 107, Iss , Pp 757-769 (2024)
Edge–cloud coordination offers the chance to mitigate the enormous storage and processing load brought on by a massive increase in traffic at the network’s edge. Though this paradigm has benefits on a large scale, outsourcing the sensitive data f
Externí odkaz:
https://doaj.org/article/53dd3d6e7b044cc2ae8c38a5a140cc3f
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-13 (2023)
Abstract Personal health record (PHR) is a medical model in which patients can upload their medical records and define the access control by themselves. Since the limited local storage and the development of cloud computing, many PHR services have be
Externí odkaz:
https://doaj.org/article/a3022f214ca74daaac3fcad46fbe7938
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 2, Pp 313-326 (2023)
Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users, and even r
Externí odkaz:
https://doaj.org/article/63459c6bff424e1185c102de1d64e7ba
Autor:
Musfirah Ihtesham, Shahzaib Tahir, Hasan Tahir, Anum Hasan, Aiman Sultan, Saqib Saeed, Omer Rana
Publikováno v:
IEEE Access, Vol 11, Pp 115204-115218 (2023)
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and th
Externí odkaz:
https://doaj.org/article/f3f3fde388ba4faaa0295e47e60a37f2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Er-Shuo Zhuang, Chun-I Fan
Publikováno v:
Mathematics, Vol 11, Iss 18, p 3830 (2023)
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic. On the other hand, since th
Externí odkaz:
https://doaj.org/article/906c3f1a843c4feba869036ac99e7bf7
Publikováno v:
Future Internet, Vol 15, Iss 6, p 197 (2023)
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful to
Externí odkaz:
https://doaj.org/article/260b684a43444d1d959eee3576af0f51
Publikováno v:
Tongxin xuebao, Vol 42, Pp 139-149 (2021)
Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.
Externí odkaz:
https://doaj.org/article/28c64414c0604f5a8b37b19d5887edb3