Review Article
Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)
Table 1
Results of the literature search.
| Topic | Online library | Number of results |
| Industrial Internet of Things applications | IEEE | 2,845 | Springer | 44,937 | Google search | 53,000 | Google Scholar | 100,000 |
| Searchable encryption for IIoT | IEEE | 9 | Springer | 8 | Google search | 124 | Google Scholar | 120 |
| Access control for IIoT | IEEE | 101 | Springer | 898 | Google search | 5,600 | Google Scholar | 5,000 |
| Privacy preserving for IIoT applications | IEEE | 19 | Springer | 114 | Google search | 1,000 | Google Scholar | 1,110 |
| Edge computing in IIoT application | IEEE | 89 | Springer | 483 | Google search | 3,150 | Google Scholar | 3,000 |
| Requirements of IIoT | IEEE | 238 | Springer | 1,057 | Google search | 5,000 | Google Scholar | 4,580 |
| Searchable encryption with access control | IEEE | 105 | Springer | 1,168 | Google search | 2,300 | Google Scholar | 10,000 |
| Monitoring system using IIoT | IEEE | 125 | Springer | 967 | Google search | 5,200 | Google Scholar | 15,100 |
| Security of IIoT applications | IEEE | 197 | Springer | 853 | Google search | 4,600 | Google Scholar | 5,030 |
|
|