Review Article

Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)

Table 1

Results of the literature search.

TopicOnline libraryNumber of results

Industrial Internet of Things applicationsIEEE2,845
Springer44,937
Google search53,000
Google Scholar100,000

Searchable encryption for IIoTIEEE9
Springer8
Google search124
Google Scholar120

Access control for IIoTIEEE101
Springer898
Google search5,600
Google Scholar5,000

Privacy preserving for IIoT applicationsIEEE19
Springer114
Google search1,000
Google Scholar1,110

Edge computing in IIoT applicationIEEE89
Springer483
Google search3,150
Google Scholar3,000

Requirements of IIoTIEEE238
Springer1,057
Google search5,000
Google Scholar4,580

Searchable encryption with access controlIEEE105
Springer1,168
Google search2,300
Google Scholar10,000

Monitoring system using IIoTIEEE125
Springer967
Google search5,200
Google Scholar15,100

Security of IIoT applicationsIEEE197
Springer853
Google search4,600
Google Scholar5,030