메뉴 건너뛰기




Volumn 6054 LNCS, Issue , 2010, Pages 136-149

Cryptographic cloud storage

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD INFRASTRUCTURES; CLOUD STORAGES; CRYPTOGRAPHIC PRIMITIVES; SERVICE PROVIDER;

EID: 77956137294     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14992-4_13     Document Type: Conference Paper
Times cited : (789)

References (34)
  • 1
    • 33745134401 scopus 로고    scopus 로고
    • Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Lee, J.M., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 205-222. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 205-222
    • Abdalla, M.1    Bellare, M.2    Catalano, D.3    Kiltz, E.4    Kohno, T.5    Lange, T.6    Lee, J.M.7    Neven, G.8    Paillier, P.9    Shi, H.10
  • 3
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of Storage from Homomorphic Identification Protocols
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 5
    • 33750246968 scopus 로고    scopus 로고
    • On the integration of public key data encryption and public key encryption with keyword search
    • Katsikas, S.K., Ĺopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo,W.: On the integration of public key data encryption and public key encryption with keyword search. In: Katsikas, S.K., Ĺopez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 217-232. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4176 , pp. 217-232
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 6
    • 54249101916 scopus 로고    scopus 로고
    • Public key encryption with keyword search revisited
    • Gervasi, O., Murgante, B., Lagaǹa, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. Springer, Heidelberg
    • Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagaǹa, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249-1259. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5072 , pp. 1249-1259
    • Baek, J.1    Safavi-Naini, R.2    Susilo, W.3
  • 8
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Bellare, M., Boldyreva, A., O'Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535-552. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 10
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • IEEE Computer Society, Los Alamitos
    • Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321-334. IEEE Computer Society, Los Alamitos (2007)
    • (2007) IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 11
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 12
    • 38049138213 scopus 로고    scopus 로고
    • Public-key encryption that allows PIR queries
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith, W.: Public-key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith, W.4
  • 13
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535-554. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 15
    • 33750696320 scopus 로고    scopus 로고
    • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
    • Jonker, W., Petkovíc, M. (eds.) SDM 2006. Springer, Heidelberg
    • Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petkovíc, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75-83. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4165 , pp. 75-83
    • Byun, J.W.1    Rhee, H.S.2    Park, H.-A.3    Lee, D.H.4
  • 16
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. Springer, Heidelberg
    • Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442-455. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3531 , pp. 442-455
    • Chang, Y.1    Mitzenmacher, M.2
  • 17
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 515-534
    • Chase, M.1
  • 19
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Juels, A., Wright, R., De Capitani di Vimercati, S. (eds.) ACM, New York
    • Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Juels, A., Wright, R., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security (CCS 2006), pp. 79-88. ACM, New York (2006)
    • (2006) ACM Conference on Computer and Communications Security (CCS 2006) , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 20
    • 70350681128 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 109-127
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 22
    • 38149055585 scopus 로고    scopus 로고
    • Decryptable searchable encryption
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • Fuhr, T., Paillier, P.: Decryptable searchable encryption. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 228-236. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 228-236
    • Fuhr, T.1    Paillier, P.2
  • 23
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • Goh, E.-J.: Secure indexes. Technical Report 2003/216, IACR ePrint Cryptography Archive (2003), http://eprint.iacr.org/2003/216
    • (2003) Technical Report 2003/216
    • Goh, E.-J.1
  • 24
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
    • Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31-45. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 26
    • 74049103479 scopus 로고    scopus 로고
    • PORs: Proofs of retrievability for large files
    • Ning, P., De Capitani di Vimercati, S., Syverson, P. (eds.) ACM, New York
    • Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Ning, P., De Capitani di Vimercati, S., Syverson, P. (eds.) ACM Conference on Computer and Communication Security (CCS 2007). ACM, New York (2007)
    • (2007) ACM Conference on Computer and Communication Security (CCS 2007)
    • Juels, A.1    Kaliski, B.2
  • 28
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • Lim, C.H., Yung, M. (eds.) WISA 2004. Springer, Heidelberg
    • Park, D., Kim, K., Lee, P.: Public key encryption with conjunctive field keyword search. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol. 3325, pp. 73-86. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3325 , pp. 73-86
    • Park, D.1    Kim, K.2    Lee, P.3
  • 29
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 30
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 31
    • 34548774576 scopus 로고    scopus 로고
    • Multi-dimensional range query over encrypted data
    • Washington, DC, USA, IEEE Computer Society, Los Alamitos
    • Shi, E., Bethencourt, J., Chan, T., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 350-364. IEEE Computer Society, Los Alamitos (2007)
    • (2007) IEEE Symposium on Security and Privacy , pp. 350-364
    • Shi, E.1    Bethencourt, J.2    Chan, T.3    Song, D.4    Perrig, A.5
  • 32
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searching on encrypted data
    • IEEE Computer Society, Los Alamitos
    • Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: IEEE Symposium on Research in Security and Privacy, pp. 44-55. IEEE Computer Society, Los Alamitos (2000)
    • (2000) IEEE Symposium on Research in Security and Privacy , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 33
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5
  • 34
    • 77956146231 scopus 로고    scopus 로고
    • Compay caught in texas data center raid loses suit against FBI
    • April
    • Zetter, K.: Compay caught in texas data center raid loses suit against FBI. Wired Magazine (April 2009)
    • (2009) Wired Magazine
    • Zetter, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.