606
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A remote sensing encrypted data search method based on a novel double-chain

ORCID Icon, ORCID Icon, &
Article: 2165638 | Received 11 Nov 2022, Accepted 03 Jan 2023, Published online: 13 Jan 2023

References

  • Bost, R. (2016). ∑Oφo: Forward secure searchable encryption. The 2016 ACM SIGSAC Conference, Vienna Austria, October 24-28, 2016.
  • Chang, Y. C., & Mitzenmacher, M. (2005, June 7–10). Privacy preserving keyword searches on remote encrypted data. Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, Proceedings.
  • Chen, C. M., Tie, Z., Wang, E. K., Khan, M. K., Kumar, S., & Kumari, S. (2021). Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Networking and Applications, 14(5), 2977–2991. https://doi.org/10.1007/s12083-021-01132-3
  • Cong, Z., Sun, S.-F., Liu, J., Shao, J., Pieprzyk, J., Pieprzyk, J., Shao, J., Liu, J., Sun, S.-F., & Zuo, C. (2019). Dynamic searchable symmetric encryption with forward and stronger backward privacy. Springer.
  • Du, R., & Wang, Y. (2020, December). Verifiable blockchain-based searchable encryption with forward and backward privacy. 16th International Conference on Mobility, Sensing and Networking (MSN, Japan, December 17-19, 2020.), Japan, December 17-19, 2020.
  • Fu, Z., Huang, F., Sun, X., Vasilakos, A. V., & Yang, C. (2019). Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Transactions on Services Computing, 12(5), 813–823. https://doi.org/10.1109/TSC.2016.2622697
  • He, K., Chen, J., Zhou, Q., Du, R., & Xiang, Y. (2020). Secure dynamic searchable symmetric encryption with constant client storage cost. IEEE Transactions on Information Forensics and Security, 16(1), 1–1. https://doi.org/10.1109/tifs.2020.3033412
  • Hoang, T., Yavuz, A. A., & Guajardo, J. (2021). A secure searchable encryption framework for privacy-critical cloud storage services. IEEE Transactions on Services Computing, 14(6), 1675–1689. https://doi.org/10.1109/TSC.2019.2897096
  • Li, F., Ma, J., Miao, Y., Jiang, Q., Liu, X., & Choo, K. K. R. (2021). Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap. IEEE Transactions on Cloud Computing, 28(5). https://doi.org/10.1109/TCC.2021.3093304
  • Li, Y. X., Zhou, F. C., Qin, Y. H., Lin, M. Q., & Xu, Z. F. (2018). Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. International Journal Of Information Security, 17(5), 549–568. https://doi.org/10.1007/s10207-017-0394-9
  • Liu, Q., Nie, X., Liu, X., Peng, T., & Wu, J. (2017, June). Verifiable ranked search over dynamic encrypted data in cloud computing. IEEE/ACM 25th International Symposium on Quality of Service (IWQoS, Barcelona, June 14–16, 2017.), Barcelona, June 14-16,2017.
  • Liu, Q., Tian, Y., Wu, J., Peng, T., & Wang, G. (2019). Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing, 15(1), 69–82. https://doi.org/10.1109/TSC.2019.2922177
  • Liu, S. C., Bovolo, F., Bruzzone, L., Tong, X. H., & Du, Q. (2022). Editorial foreword to the special issue on recent advances in multitemporal remote-sensing data processing. Ieee Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 15(1), 776–778. https://doi.org/10.1109/JSTARS.2022.3140594.
  • Shao, J., Lu, R., Guan, Y., & Wei, G. (2022). Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud. IEEE Transactions on Services Computing, 15(1), 124–137. https://doi.org/10.1109/TSC.2019.2924372
  • Soleimanian, A., & Khazaei, S. (2019). Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. Designs, Codes and Cryptography, 87(1), 123–147. https://doi.org/10.1007/s10623-018-0489-y
  • Song, X., Dong, C., Yuan, D., Xu, Q., & Zhao, M. (2020). Forward private searchable symmetric encryption with optimized I/O efficiency. IEEE Transactions on Dependable and Secure Computing, 17(5), 912–927. https://doi.org/10.1109/TDSC.2018.2822294
  • Stefanov, E., Papamanthou, C., & Shi, E. (2014). Practical dynamic searchable encryption with small leakage. Network & Distributed System Security Symposium, 24(2), 765–774. https://doi.org/10.14722/ndss.2014.23298
  • Sun, W., Liu, K., Ren, G., Liu, W., Yang, G., Meng, X., & Peng, J.. (2021). A simple and effective spectral-spatial method for mapping large-scale coastal wetlands using China ZY1-02D satellite hyperspectral images. International Journal of Applied Earth Observation and Geoinformation, 104(1), 102–572. https://doi.org/10.1016/j.jag.2021.102572
  • Tang, Y., Li, J., Yan, X., & Zhao, Q. J. M. I. S. (2021). Edge-cloud-assisted multiuser forward secure searchable encryption (EMFSSE) scheme in the P2P networking environment. Encryption (EMFSSE) Scheme in the P2P Networking Environment, 2021(6), 1–14. https://doi.org/10.1155/2021/7003252
  • Wang, H., Fan, K., Li, H., Ya Ng, Y. & Applications. (2020a). A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer-to-Peer Networking, 13(16), 2342–2355. https://doi.org/10.1007/s12083-020-00912-7
  • Wang, H. Y., Fan, K., Li, H., & Yang, Y. T. (2020b). A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. Peer-to-Peer Networking and Applications, 13(6), 2342–2355. https://doi.org/10.1007/s12083-020-00912-7
  • Wang, X., & Cheng, X. (2019). Efficient verifiable key-aggregate keyword searchable encryption for data sharing in outsourcing storage. IEEE Access, 99(8), 11732–11742. https://doi.org/10.1109/ACCESS.2019.2961169
  • Wu, C. F., Ti, Y. W., Kuo, S. Y., & Yu, C. M. (2019). Benchmarking dynamic searchable symmetric encryption with search pattern hiding. 2019 International Conference on Intelligent Computing and Its Emerging Applications (ICEA, China, August 3-6, 2019.), China, August 3–6, 2019.
  • Yan, X. X., Yin, P., Tang, Y. L., & Feng, S. W. (2022). Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network. Connection Science, 34(1), 511–528. https://doi.org/10.1080/09540091.2021.2023097
  • Ye, M., Ruiwen, N., Chang, Z., He, G., Tianli, H., Shijun, L., Yu, S., Tong, Z., & Ying, G. (2021). A lightweight model of VGG-16 for remote sensing image classification. Ieee Journal Of Selected Topics In Applied Earth Observations and Remote Sensing, 99(14), 6916–6922. https://doi.org/10.1109/JSTARS.2021.3090085
  • Yu, J., Lu, P., Zhu, Y., Xue, G., & Li, M. (2013). Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 10(4), 239–250. https://doi.org/10.1109/TDSC.2013.9
  • Zhang, N. H., Wang, Y. B., & Feng, S. (2022). A lightweight remote sensing image super-resolution method and its application in smart cities. Electronics, 11(7), 1050. https://doi.org/10.3390/electronics11071050
  • Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., & Ren, K. (2018). Enabling generic, verifiable, and secure data search in cloud services. Ieee Transactions on Parallel and Distributed Systems, 29(8), 1721–1735. https://doi.org/10.1109/TPDS.2018.2808283