2022
DOI: 10.1109/tsc.2019.2922177
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Verifiable and Dynamic Ranked Search over Outsourced Data

Abstract: Cloud computing as a promising computing paradigm is increasingly utilized as potential hosts for users' massive dataset. Since the cloud service provider (CSP) is outside the users' trusted domain, existing research suggests encrypting sensitive data before outsourcing and adopting Searchable Symmetric Encryption (SSE) to facilitate keyword-based searches over the ciphertexts. However, it remains a challenging task to design an effective SSE scheme that simultaneously supports sublinear search time, efficient… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
70
0

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 125 publications
(70 citation statements)
references
References 39 publications
0
70
0
Order By: Relevance
“…[1], the number of devices connected to IoT network has exceeded the number of human beings so that a lot of computing, storage, and data perception are completed on the edge of the network [39]. Currently, the development of artificial intelligence technology [40,41], privacy protection [42,43], and the enhancement of trust and security technology [31,35,39] make the development of the network more rapid, which brings unprecedented development opportunities to the Internet of ings (IoT) and greatly promotes the development of the network [44].…”
Section: Related Workmentioning
confidence: 99%
“…[1], the number of devices connected to IoT network has exceeded the number of human beings so that a lot of computing, storage, and data perception are completed on the edge of the network [39]. Currently, the development of artificial intelligence technology [40,41], privacy protection [42,43], and the enhancement of trust and security technology [31,35,39] make the development of the network more rapid, which brings unprecedented development opportunities to the Internet of ings (IoT) and greatly promotes the development of the network [44].…”
Section: Related Workmentioning
confidence: 99%
“…Due to the rapid improvement of the computing, storage, and perception capabilities of IoT devices, IoT devices are widely deployed in various applications [44][45][46]. Although the storage and computing power of a single IoT device is relatively small [47], the massive amount of IoT devices deployed to the edge of the network have huge computing and storage capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Meanwhile, the MEC servers has smaller distance with devices, thus the processing delay can be largely decreased compared with cloud server. The IoT-edge-cloud network can make full use of WSNs, MEC computing and cloud computing [20][21][22][23][24]. Wang et al [25] proposed a task offloading and resource allocation algorithm in a heterogeneous network.…”
Section: Background and Related Workmentioning
confidence: 99%