2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) 2015
DOI: 10.1109/3pgcic.2015.63
|View full text |Cite
|
Sign up to set email alerts
|

Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud

Abstract: Cloud computing provides dynamically scalable resources provisioned as a service over networks. But untrustworthy Cloud Service Provider(CSP) offers a big obstacle for the adoption of the cloud service since CSP can access data in Cloud without data owner's permission. Hierarchical Inner Product Encryption (HIPE) covers all applications of anonymous encryption, fully private communication and search on encrypted data, which provide trusted data access control policy to CSP. However, the existing works only ach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Initially, the IPE scheme was introduced by Katz et al [8]. Hierarchical inner product encryption was also developed having inner product predicates having levels such as predicate or attributes and searching attributes from predicates [22,23,24]. Abdalla et al [25] developed simple inner product encryption using lattices.…”
Section: Inner Product Encryptionmentioning
confidence: 99%
“…Initially, the IPE scheme was introduced by Katz et al [8]. Hierarchical inner product encryption was also developed having inner product predicates having levels such as predicate or attributes and searching attributes from predicates [22,23,24]. Abdalla et al [25] developed simple inner product encryption using lattices.…”
Section: Inner Product Encryptionmentioning
confidence: 99%
“…Therefore, by adopting IPE, one can realize multiple kinds of flexible access control using only a single cryptographic primitive. Recently, more applications for IPE have been developed, e.g., privacy-preserving video streaming [21], access control for WBAN [22], secure keyword searching [23] and outsourced data integration [24]. It shows the possibility for the application of IPE in various environments.…”
Section: Introductionmentioning
confidence: 99%