A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption.
Shen-Ming ChungMing-Der ShiehTzi-Cker ChiuehPublished in: SC² (2018)
Keyphrases
- cloud storage
- ciphertext
- cloud computing
- encrypted data
- encryption scheme
- encryption algorithm
- distributed computing
- standard model
- file system
- security properties
- third party
- computing resources
- digital libraries
- key management
- sensitive data
- information security
- secret key
- security analysis
- data hiding
- service providers
- intrusion detection
- private key
- low cost
- response time