2021
DOI: 10.32604/jcs.2021.017217
|View full text |Cite
|
Sign up to set email alerts
|

IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

Abstract: With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Cash et al [10] proposed symmetric searchable encryption that can be extended to massive databases. Existing symmetric searchable encryption schemes are expanded from multiple perspectives, including security [11,12], dynamic [13,14], and expandability [15][16][17][18].…”
Section: Symmetric Searchable Encryptionmentioning
confidence: 99%
“…Cash et al [10] proposed symmetric searchable encryption that can be extended to massive databases. Existing symmetric searchable encryption schemes are expanded from multiple perspectives, including security [11,12], dynamic [13,14], and expandability [15][16][17][18].…”
Section: Symmetric Searchable Encryptionmentioning
confidence: 99%
“…The potential threat of malicious servers hacking into data is eliminated by delivering the computational process to a decentralized and transparent blockchain system (Han et al, 2022). Data interconnection is achieved through encryption technology, which ensures the privacy of encrypted data and detection and prevents malicious adversaries from interfering with device interconnection (Xu et al, 2021) (Gholami et al, 2021).…”
Section: Searchable Encryption Algorithmmentioning
confidence: 99%