2019
DOI: 10.1016/j.is.2018.11.004
|View full text |Cite
|
Sign up to set email alerts
|

Approaches and challenges of privacy preserving search over encrypted data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Searchable encryption is defined as searching for encrypted data located on a server or cloud without the server learning anything from the data [ 6 ]. This search procedure assumes an encryption scheme that allows for the sending of a collection of encrypted data to the server while supporting keyword searches on these data [ 5 , 7 , 8 , 9 ]. The current solutions for searchable encryption either use an encryption algorithm that allows search operations to be performed on the ciphertext or an index that is created based on existing keywords.…”
Section: Related Work On Searchable Encryption and Performancementioning
confidence: 99%
“…Searchable encryption is defined as searching for encrypted data located on a server or cloud without the server learning anything from the data [ 6 ]. This search procedure assumes an encryption scheme that allows for the sending of a collection of encrypted data to the server while supporting keyword searches on these data [ 5 , 7 , 8 , 9 ]. The current solutions for searchable encryption either use an encryption algorithm that allows search operations to be performed on the ciphertext or an index that is created based on existing keywords.…”
Section: Related Work On Searchable Encryption and Performancementioning
confidence: 99%
“…These DL-based applications usually demand the gathering of large quantities of data from various IoT edge-devices for training high-quality learning models. However, the traditionally centralised DL models require the local edge-devices to upload their private data to a central cloud server, which may cause serious privacy threats [5]. These privacy threats can be mitigated through distributing the local training among multiple edge-devices, which has led to the emergence of Federated Learning (FL) [6].…”
Section: Introductionmentioning
confidence: 99%