메뉴 건너뛰기




Volumn , Issue , 2011, Pages 383-392

Authorized private keyword search over encrypted data in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD DATA; COMPLEX QUERIES; CRYPTOGRAPHIC PRIMITIVES; DATA USERS; ENCRYPTED DATA; KEYWORD SEARCH; MANAGEMENT COSTS; NOVEL SOLUTIONS; OUTSOURCE; PERSONAL HEALTH RECORD; PERSONAL INFORMATION; QUERY PRIVACY; RANGE QUERY; SEARCH CAPABILITIES; SEARCH RESULTS; STORAGE SERVERS;

EID: 80051880293     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2011.55     Document Type: Conference Paper
Times cited : (292)

References (40)
  • 1
    • 84871208156 scopus 로고    scopus 로고
    • Googlehealth. https://www.google.com/health/.
    • Googlehealth
  • 2
    • 80051904847 scopus 로고    scopus 로고
    • At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded, 2006
    • At risk of exposure - in the push for electronic medical records, concern is growing about how well privacy can be safeguarded, 2006.
  • 5
    • 34547239322 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • L. Ballard, S. Kamara, and F. Monrose. Achieving efficient conjunctive keyword searches over encrypted data. In Proc. of ICICS'05, 2005.
    • (2005) Proc. of ICICS'05
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 7
    • 74049110390 scopus 로고    scopus 로고
    • Patient controlled encryption: Ensuring privacy of electronic medical records
    • J. Benaloh, M. Chase, E. Horvitz, and K. Lauter. Patient controlled encryption: ensuring privacy of electronic medical records. In CCSW'09, pages 103-114, 2009.
    • (2009) CCSW'09 , pp. 103-114
    • Benaloh, J.1    Chase, M.2    Horvitz, E.3    Lauter, K.4
  • 9
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attributebased encryption
    • J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. In IEEE S& P'07, pages 321-334, 2007.
    • (2007) IEEE S& P'07 , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 11
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC'07, pages 535-554, 2007.
    • (2007) Proc. of TCC'07 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 12
    • 67049154037 scopus 로고    scopus 로고
    • Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
    • Springer-Verlag
    • J. Camenisch, M. Kohlweiss, A. Rial, and C. Sheedy. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In PKC'09, pages 196-214. Springer-Verlag.
    • PKC'09 , pp. 196-214
    • Camenisch, J.1    Kohlweiss, M.2    Rial, A.3    Sheedy, C.4
  • 13
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multikeyword ranked search over encrypted cloud data. In IEEE INFOCOM, 2011.
    • (2011) IEEE INFOCOM
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 14
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
    • Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Proc. of ACNS'05, pages 442-455, 2005. (Pubitemid 41422132)
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 15
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In Proc. of ACM CCS'06, 2006.
    • (2006) Proc. of ACM CCS'06
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 19
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Springer-Verlag
    • P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In ACNS 04, pages 31-45. Springer-Verlag, 2004.
    • (2004) ACNS 04 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 20
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • volume 4575 of LNCS
    • Y. Hwang and P. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing-Based Cryptography (Pairing 2007), volume 4575 of LNCS, pages 2-22. 2007.
    • (2007) Pairing-Based Cryptography (Pairing 2007) , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 22
    • 77957002082 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010.
    • (2010) EUROCRYPT
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 23
    • 79960878565 scopus 로고    scopus 로고
    • Findu: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou. Findu: Privacy-preserving personal profile matching in mobile social networks. In IEEE INFOCOM, 2011.
    • (2011) IEEE INFOCOM
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 26
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • Sept.
    • M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In SecureComm'10, pages 89-106, Sept. 2010.
    • (2010) SecureComm'10 , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 27
    • 80051913140 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management: Extended abstract
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management: extended abstract. In ACM CCS.
    • ACM CCS
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 28
    • 80051872536 scopus 로고    scopus 로고
    • Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network
    • To appear
    • R. Lu, X. Lin, X. Liang, and X. S. Shen. Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network. Mobile Netw. Appl., To appear.
    • Mobile Netw. Appl.
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.S.4
  • 30
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • M. Matsui, editor, volume 5912 of LNCS
    • T. Okamoto and K. Takashima. Hierarchical predicate encryption for inner-products. In M. Matsui, editor, Advances in Cryptology - ASIACRYPT 2009, volume 5912 of LNCS, pages 214-231. 2009.
    • (2009) Advances in Cryptology - ASIACRYPT 2009 , pp. 214-231
    • Okamoto, T.1    Takashima, K.2
  • 31
    • 33746340815 scopus 로고    scopus 로고
    • Efficient identity-based signatures secure in the standard model
    • L. Batten and R. Safavi-Naini, editors, LNCS
    • K. Paterson and J. Schuldt. Efficient identity-based signatures secure in the standard model. In L. Batten and R. Safavi-Naini, editors, Information Security and Privacy, LNCS. 2006.
    • (2006) Information Security and Privacy
    • Paterson, K.1    Schuldt, J.2
  • 32
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • volume 5444 of LNCS
    • E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In Theory of Cryptography, volume 5444 of LNCS, pages 457-473. 2009.
    • (2009) Theory of Cryptography , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 34
    • 49049104392 scopus 로고    scopus 로고
    • Delegating capabilities in predicate encryption systems
    • E. Shi and B. Waters. Delegating capabilities in predicate encryption systems. In ICALP'08, pages 560-578, 2008.
    • (2008) ICALP'08 , pp. 560-578
    • Shi, E.1    Waters, B.2
  • 36
  • 38
    • 80051874002 scopus 로고    scopus 로고
    • Defending against key abuse attacks in KP-ABE enabled broadcast systems
    • S. Yu, K. Ren, W. Lou, and J. Li. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In SecureComm'09.
    • SecureComm'09
    • Yu, S.1    Ren, K.2    Lou, W.3    Li., J.4
  • 39
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In IEEE INFOCOM'10, 2010.
    • (2010) IEEE INFOCOM'10
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 40
    • 80051906335 scopus 로고    scopus 로고
    • Peksrand: Providing predicate privacy in public-key encryption with keyword search
    • B. Zhu, B. Zhu, and K. Ren. Peksrand: Providing predicate privacy in public-key encryption with keyword search. Cryptology ePrint Archive, Report 2010/466, 2010.
    • (2010) Cryptology EPrint Archive, Report 2010/466
    • Zhu, B.1    Zhu, B.2    Ren, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.