메뉴 건너뛰기




Volumn , Issue , 2011, Pages 829-837

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD DATA; COMPLEX DATA; COORDINATE MATCHING; DATA SETS; DATA UTILIZATION; ECONOMIC SAVINGS; INNER PRODUCT; KEYWORD SEARCH; LOW OVERHEAD; NUMBER OF DATUM; OUTSOURCE; PLAINTEXT; PRIVACY PRESERVING; PRIVACY REQUIREMENTS; SEARCH QUERIES; SEARCH RESULTS; SENSITIVE DATAS; SIMILARITY MEASURE;

EID: 79960850152     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5935306     Document Type: Conference Paper
Times cited : (487)

References (29)
  • 2
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • RLCPS, January, Springer, Heidelberg
    • S. Kamara and K. Lauter, "Cryptographic cloud storage," in RLCPS, January 2010, LNCS. Springer, Heidelberg.
    • (2010) LNCS
    • Kamara, S.1    Lauter, K.2
  • 3
    • 0344756842 scopus 로고    scopus 로고
    • Modern information retrieval: A brief overview
    • A. Singhal, "Modern information retrieval: A brief overview," IEEE Data Engineering Bulletin, vol. 24, no. 4, pp. 35-43, 2001.
    • (2001) IEEE Data Engineering Bulletin , vol.24 , Issue.4 , pp. 35-43
    • Singhal, A.1
  • 5
    • 77949787383 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of S&P, 2000.
    • (2000) Proc. of S&P
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 6
    • 33244488406 scopus 로고    scopus 로고
    • E.-J. Goh, "Secure indexes," Cryptology ePrint Archive, 2003,. http://eprint.iacr.org/2003/216
    • (2003) Secure Indexes
    • Goh, E.-J.1
  • 7
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. of ACNS, 2005.
    • (2005) Proc. of ACNS
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 8
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions,"in Proc. of ACM CCS, 2006.
    • (2006) Proc. of ACM CCS
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 14
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of ACNS, 2004, pp. 31-45.
    • (2004) Proc. of ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 15
    • 34547239322 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. of ICICS, 2005.
    • (2005) Proc. of ICICS
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 16
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC, 2007, pp. 535-554.
    • (2007) Proc. of TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 18
    • 80052378201 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Pairing, 2007.
    • (2007) Pairing
    • Hwang, Y.1    Lee, P.2
  • 19
    • 77649186056 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. Of EUROCRYPT, 2008.
    • (2008) Proc. of EUROCRYPT
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 20
    • 77957002082 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. of EUROCRYPT, 2010.
    • (2010) Proc. of EUROCRYPT
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 21
    • 77649191203 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in Proc. of TCC, 2009.
    • (2009) Proc. of TCC
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 22
  • 23
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. Of INFOCOM, 2010.
    • (2010) Proc. of INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 24
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proc. Of INFOCOM, 2010.
    • (2010) Proc. of INFOCOM
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 26
    • 70349110963 scopus 로고    scopus 로고
    • Zerber+r: Top-kretrieval from a confidential index
    • S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-kretrieval from a confidential index," in Proc. of EDBT, 2009, pp. 439-449.
    • (2009) Proc. of EDBT , pp. 439-449
    • Zerr, S.1    Olmedilla, D.2    Nejdl, W.3    Siberski, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.