Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud data
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 10:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
encryption audits
windows server instance
third party auditor
storage management
Servers
security issues
secure hash algorithm
secure auditing system
Resiliency
resilience
public auditing
pubcrawl
privacy preserving
Metrics
metadata
advanced encryption standard algorithm
encryption
data storing
data privacy
data integrity
data confidentiality
Cryptography
Compositionality
cloud service providers
cloud data security
cloud data
Cloud Computing
auditing
Amazon EC2 cloud
biblio
Research on Security and Privacy of Big Data Under Cloud Computing Environment
Submitted by grigby1 on Fri, 03/22/2019 - 12:38pm
Big Data
big data security
cloud
Cloud Computing
cloud data
encryption
Metrics
pubcrawl
resilience
Resiliency
Scalability
security and privacy
storage scheme
biblio
Privacy Preserving in TPA for Secure Cloud by Using Encryption Technique
Submitted by grigby1 on Wed, 11/14/2018 - 1:13pm
secure cloud
privacy identification
privacy preserving
Protocols
pubcrawl
public auditing
public verifiers
resilience
Resiliency
Metrics
Secure storage
Servers
shared data
software/hardware error
Task Analysis
TPA
VerifyProof
data services
auditing task
Cloud Computing
cloud data
Compositionality
Cryptography
data holders
data integrity
data privacy
auditing
EAP
encryption
encryption audits
Encryption technique
extensible authentication protocol
human error
liberated encryption standard
biblio
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
outsourcing
verification codes
verifiable single keyword top-k search scheme
Top-k
Servers
security of data
security issues
Scalability
resource outsourcing
Resiliency
pubcrawl
Protocols
big data security in the cloud
Metrics
Keyword search
integrity verification
insider attacks
existing secure keyword search methods
Data models
data integrity
computer science
cloud servers
cloud data
Cloud Computing
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index
« first
‹ previous
1
2