187
Views
0
CrossRef citations to date
0
Altmetric
Articles

Searchable Encryption Taxonomy: Survey

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Alabdulatif, A., Khalil, I., & Mai, V. (2013). Protection of electronic health records (EHRs) in cloud [Paper presentation]. 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE.
  • Ali, F. S., & Lu, S. (2016). Searchable encryption with conjunctive field free keyword search scheme [Paper presentation]. 2016 International Conference on Network and Information Systems for Computers (ICNISC). IEEE.
  • Amanatidis, G., Boldyreva, A., & O’Neill, A. (2007). Provably-secure schemes for basic query support in outsourced databases. Springer.
  • Ayday, E. (2013). Privacy-preserving processing of raw genomic data. In Data privacy management and autonomous spontaneous security (pp. 133–147). Springer.
  • Baek, J., Safavi-Naini, R., & Susilo, W. (2006). On the integration of public key data encryption and public key encryption with keyword search [Paper presentation]. International conference on information security. Springer.
  • Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited [Paper presentation]. International Conference on Computational Science and Its Applications. Springer.
  • Ballard, L., Kamara, S., & Monrose, F. (2005). Achieving efficient conjunctive keyword searches over encrypted data [Paper presentation]. International Conference on Information and Communications Security. Springer.
  • Bao, F. (2008). Private query on encrypted data in multi-user settings [Paper presentation]. International Conference on Information Security Practice and Experience. Springer.
  • Bellare, M., Boldyreva, A., & O’Neill, A. (2007). Deterministic and efficiently searchable encryption [Paper presentation]. Annual International Cryptology Conference. Springer.
  • Boldyreva, A. (2009). Order-preserving symmetric encryption [Paper presentation]. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer.
  • Boneh, D., & Boyen, X. (2004). Efficient selective-ID secure identity-based encryption without random oracles [Paper presentation]. International Conference on the Theory and Applications of Cryptographic Techniques. Springer.
  • Boneh, D., & Franklin, M. (2003). Identity-based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615. https://doi.org/10.1137/S0097539701398521
  • Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data [Paper presentation]. Theory of Cryptography Conference. Springer.
  • Boneh, D., Kushilevitz, E., Ostrovsky, R., & Skeith, W. E. (2007). Public key encryption that allows PIR queries [Paper presentation]. Annual International Cryptology Conference. Springer.
  • Bösch, C. (2012). Selective document retrieval from encrypted database [Paper presentation]. International Conference on Information Security. Springer.
  • Bösch, C., Hartel, P., Jonker, W., & Peter, A. (2015). A survey of provably secure searchable encryption. ACM Computing Surveys, 47(2), 1–51. https://doi.org/10.1145/2636328
  • Brindha, K., & Jeyanthi, N. (2015). Securing cloud data using visual cryptography [Paper presentation]. International Conference on Innovation Information in Computing Technologies. IEEE.
  • Brinkman, R. (2007). Different search strategies on encrypted data compared. In Security, privacy, and trust in modern data management (pp. 183–196). Springer.
  • Buyrukbilen, S., & Bakiras, S. (2013). Privacy-preserving ranked search on public-key encrypted data [Paper presentation]. 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing IEEE.
  • Byun, J. W., Lee, D. H., & Lim, J. (2006). Efficient conjunctive keyword search on encrypted data storage system [Paper presentation]. European Public Key Infrastructure Workshop. Springer.
  • Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222–233. https://doi.org/10.1109/TPDS.2013.45
  • Cash, D. (2013). Highly-scalable searchable symmetric encryption with support for Boolean queries [Paper presentation]. Annual Cryptology Conference. Springer.
  • Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Ros, M.-C., & Steiner, M. (2014). Dynamic searchable encryption in very-large databases: Data structures and implementation. NDSS Citeseer.
  • Catalano, D., & Fiore, D. (2013). Vector commitments and their applications [Paper presentation]. International Workshop on Public Key Cryptography (pp. 55–72). Springer.
  • Çetin, G. S., Chen, H., Laine, K., Lauter, K., Rindal, P., & Xia, Y. (2017). Private queries on encrypted genomic data. BMC Medical Genomics, 10(S2), 1–14. https://doi.org/10.1186/s12920-017-0276-z
  • Chang, Y.-C., & Mitzenmacher, M. (2005). Privacy preserving keyword searches on remote encrypted data [Paper presentation]. International Conference on Applied Cryptography and Network Security. Springer.
  • Chase, M., & Kamara, S. (2010). Structured encryption and controlled disclosure [Paper presentation]. International Conference on the Theory and Application of Cryptology and Information Security. Springer.
  • Chen, C. (2014). A hierarchical clustering method for big data oriented ciphertext search [Paper presentation]. 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE.
  • Chen, C., Zhu, X., Shen, P., Hu, J., Guo, S., Tari, Z., & Zomaya, A. Y. (2016). An efficient privacy-preserving ranked keyword search method. IEEE Transactions on Parallel and Distributed Systems, 27(4), 951–963. https://doi.org/10.1109/TPDS.2015.2425407
  • Chen, R., Mu, Y., Yang, G., Guo, F., & Wang, X. (2015). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 11(4), 789–798.
  • Chen, Z., Wu, C., Wang, D., & Li, S. (2012). Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor [Paper presentation]. Pacific-Asia Workshop on Intelligence and Security Informatics (pp 176–189). Springer.
  • Cheon, J. H. (2016). Ghostshell: Secure Biometric authentication using integrity-based homomorphic evaluations. IACR Cryptology ePrint Archive, 2016, 484.
  • Chuah, M., & Hu, W. (2011). Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data [Paper presentation]. 2011 31st International Conference on Distributed Computing Systems Workshops. IEEE.
  • Cui, J., Zhou, H., Zhong, H., & Xu, Y. (2018). AKSER: Attribute-based keyword search with efficient revocation in cloud computing. Information Sciences, 423, 343–352. https://doi.org/10.1016/j.ins.2017.09.029
  • Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2011). Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), 895–934. https://doi.org/10.3233/JCS-2011-0426
  • Dai, H., Yang, M., Yang, G., Xiang, Y., Hu, Z., & Wang, H. (2021). A keyword-grouping inverted index based multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Sustainable Computing, 1–1. https://doi.org/10.1109/TSUSC.2021.3125520
  • Deng, Z., Li, K., Li, K., & Zhou, J. (2017). A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Generation Computer Systems, 72, 208–218. https://doi.org/10.1016/j.future.2016.05.017
  • Di Crescenzo, G., & Saraswat, V. (2007). Public key encryption with searchable keywords based on Jacobi symbols [Paper presentation]. International Conference on Cryptology in India. Springer.
  • Du, M., Wang, Q., He, M., & Weng, J. (2018). Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Transactions on Information Forensics and Security, 13(9), 2320–2332. https://doi.org/10.1109/TIFS.2018.2818651
  • Farràs, O., & Ribes-González, J. (2019). Provably secure public-key encryption with conjunctive and subset keyword search. International Journal of Information Security, 18(5), 533–548. https://doi.org/10.1007/s10207-018-00426-7
  • Fu, Z. (2013). Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. IEEE.
  • Fu, Z. (2016). Towards efficient content-aware search over encrypted outsourced data in cloud [Paper presentation]. IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications. IEEE.
  • Fu, Z., Huang, F., Sun, X., Vasilakos, A. V., & Yang, C.-N. (2019). Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Services Computing, 12(5), 813–823. https://doi.org/10.1109/TSC.2016.2622697
  • Fu, Z., Sun, X., Linge, N., & Zhou, L. (2014). Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Transactions on Consumer Electronics, 60(1), 164–172. https://doi.org/10.1109/TCE.2014.6780939
  • Fu, Z., Xia, L., Sun, X., Liu, A. X., & Xie, G. (2018). Semantic-aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security, 13(9), 2359–2371. https://doi.org/10.1109/TIFS.2018.2819121
  • Geffert, V. (2008). SOFSEM 2008: Theory and practice of computer science [Paper presentation]. 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19–25, 2008, Proceedings (Vol. 4910). Springer.
  • Goh, E.-J. (2003). Secure indexes. IACR Cryptology ePrint Archive, 2003, 216.
  • Golle, P., Staddon, J., & Waters, B. (2004). Secure conjunctive keyword search over encrypted data [Paper presentation]. International Conference on Applied Cryptography and Network Security. Springer.
  • Han, F., Qin, J., & Hu, J. (2016). Secure searches in the cloud: A survey. Future Generation Computer Systems, 62, 66–75. https://doi.org/10.1016/j.future.2016.01.007
  • Handa, R., & Challa, R. K. (2015). A cluster based multi-keyword search on outsourced encrypted cloud data [Paper presentation]. 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE.
  • Handa, R., Krishna, C. R., & Aggarwal, N. (2018). An efficient approach for secure information retrieval on cloud. Journal of Intelligent & Fuzzy Systems, 34(3), 1345–1353. https://doi.org/10.3233/JIFS-169430
  • Hasan, M. Z., Mahdi, M. S. R., Sadat, M. N., & Mohammed, N. (2018). Secure count query on encrypted genomic data. Journal of Biomedical Informatics, 81, 41–52. https://doi.org/10.1016/j.jbi.2018.03.003
  • Hore, B., Mehrotra, S., Canim, M., & Kantarcioglu, M. (2012). Secure multidimensional range queries over outsourced data. The VLDB Journal, 21(3), 333–358. https://doi.org/10.1007/s00778-011-0245-7
  • Hore, B., Mehrotra, S., Canim, M., & Kantarcioglu, M. (2012). Secure multidimensional range queries over outsourced data. The VLDB Journal, 21(3), 333–358. https://doi.org/10.1007/s00778-011-0245-7
  • Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403, 1–14.
  • Hwang, Y. H., & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system [Paper presentation]. International Conference on Pairing-Based Cryptography. Springer.
  • Ibrahim, A., Jin, H., Yassin, A. A., & Zou, D. (2012). Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data [Paper presentation]. 2012 IEEE Asia-Pacific Services Computing Conference. IEEE.
  • Jin, Z., & Chen, Y. (2015). Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Computing, 14(1), 54–61. https://doi.org/10.1109/MPRV.2015.19
  • Kamal, A. A. A. M., & Iwamura, K. (2019). Searchable encryption using secret-sharing scheme for multiple keyword search using conjunctive and disjunctive searching [Paper presentation]. 2019 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (pp. 149–156). IEEE.
  • Kamara, S., & Lauter, K. (2010). Cryptographic cloud storage. Springer.
  • Kamara, S., & Papamanthou, C. (2013). Parallel and dynamic searchable symmetric encryption [Paper presentation]. International Conference on Financial Cryptography and Data Security. Springer.
  • Kamara, S., Papamanthou, C., & Roeder, T. (2012). Dynamic searchable symmetric encryption [Paper presentation]. Proceedings of the 2012 ACM Conference on Computer and Communications Security.
  • Khurana, A., & Challa, C. (2017). Search with context sensitive synonyms: In multi keyword ranked search over the encrypted cloud data [Paper presentation]. International Conference on Communication, Computing and Networking ICCCN.
  • Kokoç, M., & Ersöz, S. (2021). New ranking functions for interval-valued intuitionistic fuzzy sets and their application to multi-criteria decision-making problem. Cybernetics and Information Technologies, 21(1), 3–18. https://doi.org/10.2478/cait-2021-0001
  • Kurosawa, K., & Ohtaki, Y. (2012). UC-secure searchable symmetric encryption [Paper presentation]. International Conference on Financial Cryptography and Data Security. Springer.
  • Kuzu, M., Islam, M. S., & Kantarcioglu, M. (2012). Efficient similarity search over encrypted data. IEEE.
  • Li, J. (2010). Fuzzy keyword search over encrypted data in cloud computing. IEEE.
  • Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2009). Enabling efficient fuzzy keyword search over encrypted data in cloud computing. IACR Cryptology ePrint Archive, 2009, 593.
  • Li, M. (2011). Authorized private keyword search over encrypted data in cloud computing [Paper presentation]. 2011 31st International Conference on Distributed Computing Systems. IEEE.
  • Li, R., & Liu, A. X. (2017). Adaptively secure conjunctive query processing over encrypted data for cloud computing [Paper presentation]. 2017 IEEE 33rd International Conference on Data Engineering (ICDE). IEEE.
  • Li, R., Xu, Z., Kang, W., Yow, K. C., & Xu, C.-Z. (2014). Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Generation Computer Systems, 30, 179–190. https://doi.org/10.1016/j.future.2013.06.029
  • Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10(9), 1981–1992. https://doi.org/10.1109/TIFS.2015.2442215
  • Lin, H., Shao, J., Zhang, C., & Fang, Y. (2013). CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Transactions on Information Forensics and Security, 8(6), 985–997. https://doi.org/10.1109/TIFS.2013.2255593
  • Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2013). Towards differential query services in cost-efficient clouds. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1648–1658.
  • Liu, Q., Tan, C. C., Wu, J., & Wang, G. (2012). Cooperative private searching in clouds. Journal of Parallel and Distributed Computing, 72(8), 1019–1031. https://doi.org/10.1016/j.jpdc.2012.04.012
  • Liu, Q., Wang, G., & Wu, J. (2009). An efficient privacy preserving keyword search scheme in cloud computing [Paper presentation]. 2009 International Conference on Computational Science and Engineering. IEEE.
  • Liu, Q., Wang, G., & Wu, J. (2012). Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications, 35(3), 927–933. https://doi.org/10.1016/j.jnca.2011.03.010
  • Liu, Z., Lv, S., Wei, Y., Li, J., Liu, J. K., & Xiang, Y. (2017). FFSSE: Flexible forward secure searchable encryption with efficient performance. IACR Cryptology ePrint Archive, 2017, 1105.
  • Lu, R. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621–1631.
  • Ma, R., Li, J., Guan, H., Xia, M., & Liu, X. (2015). EnDAS: Efficient encrypted data search as a mobile cloud service. IEEE Transactions on Emerging Topics in Computing, 3(3), 372–383. https://doi.org/10.1109/TETC.2015.2445101
  • Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389–402. https://doi.org/10.1016/j.ins.2015.08.053
  • Mathew, S., & Hafsath, C. (2014). Facilitating efficient encrypted document storage and retrieval in a cloud framework. IOSR Journal of Computer Engineering, 16(5), 18–24. https://doi.org/10.9790/0661-16541824
  • Mearian, L. (2015). Insurance company now offers discounts–If you let it track your Fitbit. Computerworld.
  • Miao, Y., Ma, J., Jiang, Q., Li, X., & Sangaiah, A. K. (2018). Verifiable keyword search over encrypted cloud data in smart city. Computers & Electrical Engineering, 65, 90–101. https://doi.org/10.1016/j.compeleceng.2017.06.021
  • Miao, Y., Ma, J., Liu, X., Liu, Z., Shen, L., & Wei, F. (2018). VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications, 11(2), 287–297. https://doi.org/10.1007/s12083-016-0487-7
  • Miao, Y., Ma, J., Wei, F., Liu, Z., Wang, X. A., & Lu, C. (2017). VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Networking and Applications, 10(4), 995–1007. https://doi.org/10.1007/s12083-016-0458-z
  • Naor, M., & Pinkas, B. (1999). Oblivious transfer and polynomial evaluation [Paper presentation]. Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing.
  • Naor, M., & Pinkas, B. (2006). Oblivious polynomial evaluation. SIAM Journal on Computing, 35(5), 1254–1281. https://doi.org/10.1137/S0097539704383633
  • Nepolean, D., Karthik, I., Preethi, M., Goyal, R., & Vanethi, M. K. (2014). Privacy preserving ranked keyword search over encrypted cloud data [Paper presentation]. International Conference on Security in Computer Networks and Distributed Systems. Springer.
  • Örencik, C., & Savaş, E. (2012). Efficient and secure ranked multi-keyword search on encrypted cloud data [Paper presentation]. Proceedings of the 2012 Joint EDBT/ICDT Workshops.
  • Örencik, C., & Savaş, E. (2014). An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distributed and Parallel Databases, 32(1), 119–160. https://doi.org/10.1007/s10619-013-7123-9
  • Ostrovsky, R., & Skeith, W. E. (2005). Private searching on streaming data [Paper presentation]. Annual International Cryptology Conference. Springer.
  • Park, D. J., Cha, J., & Lee, P. J. (2005). Searchable keyword-based encryption. IACR Cryptology ePrint Archive, 2005, 367.
  • Park, D. J., Kim, K., & Lee, P. J. (2004). Public key encryption with conjunctive field keyword search [Paper presentation]. International Workshop on Information Security Applications. Springer.
  • Park, H.-A., Park, J. H., & Lee, D. H. (2011). PKIS: Practical keyword index search on cloud datacenter. EURASIP Journal on Wireless Communications and Networking, 2011(1), 1–16. https://doi.org/10.1186/1687-1499-2011-64
  • Pasupuleti, S. K., Ramalingam, S., & Buyya, R. (2016). An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64, 12–22. https://doi.org/10.1016/j.jnca.2015.11.023
  • Pervez, Z., Awan, A. A., Khattak, A. M., Lee, S., & Huh, E.-N. (2013). Privacy-aware searching with oblivious term matching for cloud storage. The Journal of Supercomputing, 63(2), 538–560. https://doi.org/10.1007/s11227-012-0829-z
  • Pham, H., Woodworth, J., & Amini Salehi, M. (2019). Survey on secure search over encrypted data on the cloud. Concurrency and Computation: Practice and Experience, 31(17), e5284. https://doi.org/10.1002/cpe.5284
  • Poh, G. S., Chin, J.-J., Yau, W.-C., Choo, K.-K R., & Mohamad, M. S. (2017). Searchable symmetric encryption: designs and challenges. ACM Computing Surveys, 50(3), 1–37. https://doi.org/10.1145/3064005
  • Popa, R. A. (2011). CryptDB: Protecting confidentiality with encrypted query processing [Paper presentation]. SOSP '11: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles.
  • Raykova, M. (2009). Secure anonymous database search [Paper presentation]. CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. https://doi.org/10.1145/1655008.1655025
  • Reynolds, P., & Vahdat, A. (2003). Efficient peer-to-peer keyword searching [Paper presentation]. ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing. Springer.
  • Rhee, H. S., Byun, J. W., Lee, D. H., Lim, J. (2005). Oblivious conjunctive keyword search [Paper presentation]. International Workshop on Information Security Applications. Springer.
  • Rhee, H. S., Park, J.H., Susilo, W., Lee, D.H., (2010). Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of System Software, 83(5), 763–771. https://doi.org/10.1016/j.jss.2009.11.726.
  • Salam, M. I., Yau, W.-C., Chin, J.-J., Heng, S.-H., Ling, H.-C., Phan, R. C.-W., Poh, G. S., Tan, S.-Y., & Yap, W.-S. (2015). Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Human-Centric Computing and Information Sciences, 5(1), 1–16. https://doi.org/10.1186/s13673-015-0039-9
  • Santos, N. (2014). Using ARM TrustZone to build a trusted language runtime for mobile applications [Paper presentation]. ASPLOS '14: Proceedings of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems. https://doi.org/10.1145/2541940.2541949
  • Sepehri, M., Cimato, S., & Damiani, E. (2015). Privacy-preserving query processing by multi-party computation. The Computer Journal, 58(10), 2195–2212. https://doi.org/10.1093/comjnl/bxu093
  • Shen, E., Shi, E., & Waters, B. (2009). Predicate privacy in encryption systems [Paper presentation]. Theory of Cryptography Conference. Springer.
  • Shen, Z., Shu, J., & Xue, W. (2017). Keyword search with access control over encrypted cloud data. IEEE Sensors Journal, 17(3), 858–868. https://doi.org/10.1109/JSEN.2016.2634018
  • Shi, E., Bethencourt, J., Hubert Chan, T.-H., Song, D., & Perrig, A. (2007). Multi-dimensional range query over encrypted data [Paper presentation]. 2007 IEEE Symposium on Security and Privacy (SP'07). IEEE.
  • Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. IEEE.
  • Song, W., Wang, B., Wang, Q., Peng, Z., Lou, W., & Cui, Y. (2017). A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. Journal of Parallel and Distributed Computing, 99, 14–27. https://doi.org/10.1016/j.jpdc.2016.05.017
  • Stefanov, E., Papamanthou, C., & Shi, E. (2013). Practical dynamic searchable encryption with small leakage. Cryptology ePrint Archive, 2013, 15.
  • Strizhov, M., & Ray, I. (2014). Multi-keyword similarity search over encrypted cloud data [Paper presentation]. IFIP International Information Security Conference. Springer.
  • Sun, J., Wang, X., Wang, S., & Ren, L. (2018). A searchable personal health records framework with fine-grained access control in cloud-fog computing. PLoS One, 13(11), e0207543.
  • Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Thomas Hou, Y., & Li, H. (2013). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking [Paper presentation]. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security.
  • Sun, W., Lou, W., Thomas Hou, Y., & Li, H. (2014). Privacy-preserving keyword search over encrypted data in cloud computing. In Secure cloud computing (pp. 189–212). Springer.
  • Sun, W., Yu, S., Lou, W., Thomas Hou, Y., & Li, H. (2014). Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 27(4), 807–1198.
  • Sun, W., Liu, X., Lou, W., Thomas Hou, Y., & Li, H. (2015). Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data [Paper presentation]. 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE.
  • Sun, X. (2013). Secure keyword-based ranked semantic search over encrypted cloud data. Proceedings of the Advanced Science and Technology Letters, 31, 271–283.
  • Sun, X., Zhu, Y., Xia, Z., & Chen, L. (2014). Privacy preserving keyword based semantic search over encrypted cloud data. International Journal of Security and Its Applications, 8(3), 9–20. https://doi.org/10.14257/ijsia.2014.8.3.02
  • Swaminathan, A. (2007). Confidentiality-preserving rank-ordered search [Paper presentation]. https://doi.org/10.1145/1314313.1314316
  • Tian, K., Zhang, W., Li, K., Wu, J., & Yu, N. (2013). A novel fuzzy keyword retrieval scheme over encrypted cloud data. Wuhan University Journal of Natural Sciences, 18(5), 393–401. https://doi.org/10.1007/s11859-013-0947-3
  • Tian, Y. (2009). A fast search method for encrypted medical data. IEEE.
  • Tong, Y., Sun, J., Chow, S. S. M., & Li, P. (2014). Cloud-assisted mobile-access of health data with privacy and auditability. IEEE Journal of Biomedical and Health Informatics, 18(2), 419–429. https://doi.org/10.1109/JBHI.2013.2294932
  • Trakadis, Y. J. (2012). Patient-controlled encrypted genomic data: An approach to advance clinical genomics. BMC Medical Genomics, 5(1), 1–11. https://doi.org/10.1186/1755-8794-5-31
  • Tseng, C.-Y., Lu, C., & Chou, C.-F. (2015). Efficient privacy-preserving multi-keyword ranked search utilizing document replication and partition [Paper presentation]. 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE.
  • Tueno, A., & Kerschbaum, F. (2018). Secure range queries for multiple users. arXiv preprint arXiv:1802.01138.
  • Ucal, M. (2005). Searching on encrypted data. Department of Electrical and Computer Engineering, University of Maryland.
  • Van Liesdonk, P. (2010). Computationally efficient searchable symmetric encryption [Paper presentation]. Workshop on Secure Data Management. Springer.
  • Wan, Z., & Deng, R. H. (2018). VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 15(6), 1083–1095. https://doi.org/10.1109/TDSC.2016.2635128
  • Wang, B. (2014). Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud [Paper presentation]. IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE.
  • Wang, B. (2015). Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee [Paper presentation]. 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE.
  • Wang, C. (2010). Secure ranked keyword search over encrypted cloud data [Paper presentation]. 2010 IEEE 30th International Conference on Distributed Computing Systems. IEEE.
  • Wang, C., Cao, N., Ren, K., & Lou, W. (2012). Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1467–1479. https://doi.org/10.1109/TPDS.2011.282
  • Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5(2), 220–232. https://doi.org/10.1109/TSC.2011.24
  • Wang, N., Fu, J., Bhargava, B. K., & Zeng, J. (2018). Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Transactions on Information Forensics and Security, 13(10), 2653–2667. https://doi.org/10.1109/TIFS.2018.2825952
  • Wang, P., Wang, H., & Pieprzyk, J. (2007). Common secure index for conjunctive keyword-based retrieval over encrypted data [Paper presentation]. Workshop on Secure Data Management. Springer.
  • Wang, P., Wang, H., & Pieprzyk, J. (2008a). An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data [Paper presentation]. International Workshop on Information Security Applications. Springer.
  • Wang, P., Wang, H., & Pieprzyk, J. (2008b). Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups [Paper presentation]. International Conference on Cryptology and Network Security. Springer.
  • Wang, P., Wang, H., & Pieprzyk, J. (2008c). Threshold privacy preserving keyword searches [Paper presentation]. International Conference on Current Trends in Theory and Practice of Computer Science. Springer.
  • Wang, Y., Wang, J., & Chen, X. (2016). Secure searchable encryption: a survey. Journal of Communications and Information Networks, 1(4), 52–65. https://doi.org/10.1007/BF03391580
  • Waters, B. R. (2004). Building an encrypted and searchable audit log. Citeseer.
  • Wen, M. (2013). ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid [Paper presentation]. 2013 IEEE Global Communications Conference (GLOBECOM). IEEE.
  • Wong, W. K. (2009). Secure knn computation on encrypted databases [Paper presentation]. Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data.
  • Wu, Z., & Li, K. (2019). VBTree: Forward secure conjunctive queries over encrypted data for cloud computing. The VLDB Journal, 28(1), 25–46. https://doi.org/10.1007/s00778-018-0517-6
  • Xia, Z. (2013). An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data. Advanced Science and Technology Letters, 31, 284.
  • Xu, K., Wang, G., Wang, S., Zhao, Z., & Wang, J. (2017). A secure channel free conjunctive keyword search without random oracle under simple assumption [Paper presentation]. 2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN). IEEE.
  • Xu, P., Jin, H., Wu, Q., & Wang, W. (2013). Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on Computers, 62(11), 2266–2277. https://doi.org/10.1109/TC.2012.215
  • Xu, Q., Shen, H.; Sang, Y., & Tian, H. (2013). Privacy-preserving ranked fuzzy keyword search over encrypted cloud data [Paper presentation]. 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies. IEEE.
  • Yang, Y. Y., Gong, B., Jia, Z. J., Cheng, Y. G., & He, Y. C. (2021). Research on the ranked searchable encryption scheme based on an access Tree in IoTs. Wireless Communications and Mobile Computing. 2021, 1–10. https://doi.org/10.1155/2021/3265934
  • Yao, X., Lin, Y., Liu, Q., & Zhang, J. (2018). Privacy-preserving search over encrypted personal health record in multi-source cloud. IEEE Access, 6, 3809–3823. https://doi.org/10.1109/ACCESS.2018.2793304
  • Yoshino, M., Kunihiro, N., Naganuma, K., & Sato, H. (2012). Symmetric inner-product predicate encryption based on three groups [Paper presentation]. International Conference on Provable Security. Springer.
  • Yu, J., Lu, P., Zhu, Y., Xue, G., & Li, M. (2013). Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 10(4), 239–250. https://doi.org/10.1109/TDSC.2013.9
  • Yuan, J., Yu, S., & Guo, L. (2015). SEISA: Secure and efficient encrypted image search with access control [Paper presentation]. 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE.
  • Yuan, X., Wang, X., Wang, C., Yu, C., & Nutanong, S. (2017). Privacy-preserving similarity joins over encrypted data. IEEE Transactions on Information Forensics and Security, 12(11), 2763–2775. https://doi.org/10.1109/TIFS.2017.2721221
  • Zhang, B., & Zhang, F. (2011). An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications, 34(1), 262–267. https://doi.org/10.1016/j.jnca.2010.07.007
  • Zhang, R., Xue, R., Yu, T., & Liu, L. (2016a). Dynamic and efficient private keyword search over inverted index–based encrypted data. ACM Transactions on Internet Technology (TOIT), 16(3), 1–20.
  • Zhang, R., Xue, R., Yu, T., & Liu, L. (2016b). PVSAE: A public verifiable searchable encryption service framework for outsourced encrypted data [Paper presentation]. 2016 IEEE International Conference on Web Services (ICWS). IEEE.
  • Zhang, W., Lin, Y., & Qi, G. (2018). Catch you if you misbehave: Ranked keyword search results verification in cloud computing. IEEE Transactions on Cloud Computing, 6(1), 74–86. https://doi.org/10.1109/TCC.2015.2481389
  • Zhang, Y., Qin, J., & Du, L. (2016). A secure biometric authentication based on PEKS. Concurrency and Computation: Practice and Experience, 28(4), 1111–1123. https://doi.org/10.1002/cpe.3539
  • Zhang, W. (2014). Secure ranked multi-keyword search for multiple data owners in cloud computing [Paper presentation]. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE.
  • Zhao, R., Sun, Y., & Iwaihara, M. (2017). LRSE: a lightweight efficient searchable encryption scheme using local and global representations. arXiv preprint arXiv:1705.11056
  • Zhou, W. (2013). K-gram based fuzzy keyword search over encrypted cloud computing. Journal of Software Engineering and Applications, 6(1), 29–32.
  • Zhu, B., Zhu, B., & Ren, K. (2011). Peksrand: Providing predicate privacy in public-key encryption with keyword search [Paper presentation]. 2011 IEEE International Conference on Communications (ICC). IEEE.
  • Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., & Ren, K. (2018). Enabling generic, verifiable, and secure data search in cloud services. IEEE Transactions on Parallel and Distributed Systems, 29(8), 1721–1735. https://doi.org/10.1109/TPDS.2018.2808283

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.