Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

ciphertext search

biblio

Visible to the public Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
  • locality-sensitive hashing
  • Computing Theory and Privacy
  • single data owner model
  • searchable encryption schemes
  • search privacy
  • privacy-preserving fuzzy multikeyword search
  • plaintext search techniques
  • multiple data owners
  • LSH
  • Information Leakage
  • fuzzy multi-keyword search.
  • encrypted documents
  • ciphertext search
  • Bloom filter
  • BF
  • Cloud Computing
  • Privacy-preserving
  • encryption method
  • cloud server
  • Indexes
  • fuzzy set theory
  • query processing
  • pubcrawl
  • Human behavior
  • Resiliency
  • data privacy
  • encryption
  • Cryptography
  • Servers
  • Scalability
biblio

Visible to the public A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree

Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
  • Resiliency
  • optimal search efficiency
  • Outsourced Database Integrity
  • outsourcing
  • Privacy-preserving
  • privacy-preserving multikeyword ranked search
  • pubcrawl
  • query generation
  • query processing
  • multi-keyword ranked search
  • sensitive data outsourcing
  • Servers
  • TF×IDF model
  • top-k search
  • trapdoor
  • tree data structures
  • vector space model
  • word-digest
  • data privacy
  • authentication
  • ciphertext search
  • Cloud Computing
  • cloud data
  • communication overhead reduction
  • composability
  • Cryptography
  • data integrity
  • authenticated data structure
  • database indexing
  • encrypted cloud data
  • index construction
  • Indexes
  • inverted file index
  • Metrics
  • MIR-tree
  • MIR-tree based index

Terms of Use  |  ©2023. CPS-VO