메뉴 건너뛰기




Volumn , Issue , 2011, Pages 393-402

Privacy-preserving query over encrypted graph-structured data in cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD DATA; COMPLEX DATA; COMPUTATION TECHNIQUES; COMPUTING PARADIGM; DATA UTILIZATION; ECONOMIC SAVINGS; ENCRYPTED DATA; FEATURE-BASED; FILTERING PROCEDURES; GRAPH QUERIES; INNER PRODUCT; OUTSOURCE; PRIVACY BREACHES; PRIVACY PRESERVING; PRIVACY REQUIREMENTS; SENSITIVE DATAS;

EID: 80051914330     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2011.84     Document Type: Conference Paper
Times cited : (147)

References (28)
  • 2
    • 80051911576 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • January, LNCS. Springer, Heidelberg
    • S. Kamara and K. Lauter, "Cryptographic cloud storage, " in RLCPS, January 2010, LNCS. Springer, Heidelberg.
    • (2010) RLCPS
    • Kamara, S.1    Lauter, K.2
  • 3
    • 26444501752 scopus 로고    scopus 로고
    • Algorithmics and applications of tree and graph searching
    • D. Shasha, J.-L. Wang, and R. Giugno, "Algorithmics and applications of tree and graph searching, " in Proc. of PODS, 2002.
    • (2002) Proc. of PODS
    • Shasha, D.1    Wang, J.-L.2    Giugno, R.3
  • 4
    • 3142736597 scopus 로고    scopus 로고
    • Graph indexing: A frequent structurebased approach
    • X. Yan, P. S. Yu, and J. Han, "Graph indexing: a frequent structurebased approach, " in Proc. of SIGMOD, 2004.
    • (2004) Proc. of SIGMOD
    • Yan, X.1    Yu, P.S.2    Han, J.3
  • 5
    • 85011066999 scopus 로고    scopus 로고
    • Graph indexing: Tree + delta >= graph
    • P. Zhao, J. X. Yu, and P. S. Yu, "Graph indexing: tree + delta >= graph, " in Proc. of VLDB, 2007.
    • (2007) Proc. of VLDB
    • Zhao, P.1    Yu, J.X.2    Yu, P.S.3
  • 6
    • 34548731280 scopus 로고    scopus 로고
    • Treepi: A novel graph indexing method
    • S. Zhang, M. Hu, and J. Yang, "Treepi: A novel graph indexing method, " in Proc. of ICDE, 2007.
    • (2007) Proc. of ICDE
    • Zhang, S.1    Hu, M.2    Yang, J.3
  • 7
    • 35448982399 scopus 로고    scopus 로고
    • Fg-index: Towards verification-free query processing on graph databases
    • J. Cheng, Y. Ke, W. Ng, and A. Lu, "Fg-index: towards verification-free query processing on graph databases, " in Proc. of SIGMOD, 2007.
    • (2007) Proc. of SIGMOD
    • Cheng, J.1    Ke, Y.2    Ng, W.3    Lu, A.4
  • 8
    • 84859197018 scopus 로고    scopus 로고
    • Taming verification hardness: An efficient algorithm for testing subgraph isomorphism
    • H. Shang, Y. Zhang, X. Lin, and J. X. Yu, "Taming verification hardness: an efficient algorithm for testing subgraph isomorphism, " in Proc. of VLDB, 2008.
    • (2008) Proc. of VLDB
    • Shang, H.1    Zhang, Y.2    Lin, X.3    Yu, J.X.4
  • 10
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions, " in Proc. of ACM CCS, 2006.
    • (2006) Proc. of ACM CCS
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 12
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data, " in Proc. of ICDCS, 2010.
    • (2010) Proc. of ICDCS
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 14
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " in Proc. of INFOCOM, 2011.
    • (2011) Proc. of INFOCOM
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 16
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing, " in Proc. of INFOCOM, 2010.
    • (2010) Proc. of INFOCOM
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 19
    • 78149333073 scopus 로고    scopus 로고
    • Gspan: Graph-based substructure pattern mining
    • X. Yan and J. Han, "gspan: Graph-based substructure pattern mining, " in Proc. of ICDM, 2002.
    • (2002) Proc. of ICDM
    • Yan, X.1    Han, J.2
  • 20
    • 12244294066 scopus 로고    scopus 로고
    • A quickstart in frequent structure mining can make a difference
    • S. Nijssen and J. N. Kok, "A quickstart in frequent structure mining can make a difference, " in Proc. of SIGKDD, 2004.
    • (2004) Proc. of SIGKDD
    • Nijssen, S.1    Kok, J.N.2
  • 21
    • 78149328300 scopus 로고    scopus 로고
    • Efficient mining of frequent subgraphs in the presence of isomorphism
    • J. Huan, W. Wang, and J. Prins, "Efficient mining of frequent subgraphs in the presence of isomorphism, " in Proc. of ICDM, 2003.
    • (2003) Proc. of ICDM
    • Huan, J.1    Wang, W.2    Prins, J.3
  • 24
    • 57049107456 scopus 로고    scopus 로고
    • Searching in encrypted data
    • PhD thesis
    • R. Brinkman, "Searching in encrypted data, " in University of Twente, PhD thesis, 2007.
    • (2007) University of Twente
    • Brinkman, R.1
  • 26
    • 72849130119 scopus 로고    scopus 로고
    • Gboost: A mathematical programming approach to graph classification and regression
    • H. Saigo, S. Nowozin, T. Kadowaki, T. Kudo, and K. Tsuda, "Gboost: A mathematical programming approach to graph classification and regression, " in Machine Learning, 2008.
    • (2008) Machine Learning
    • Saigo, H.1    Nowozin, S.2    Kadowaki, T.3    Kudo, T.4    Tsuda, K.5
  • 27
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Proc. of TCC, 2007, pp. 535-554.
    • (2007) Proc. of TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 28
    • 77957002082 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, " in Proc. of EUROCRYPT, 2010.
    • (2010) Proc. of EUROCRYPT
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.