메뉴 건너뛰기




Volumn , Issue , 2011, Pages 282-286

Towards secure and effective utilization over encrypted cloud data

Author keywords

[No Author keywords available]

Indexed keywords

CAPITAL OUTLAY; CLOUD DATA; CLOUD SERVICES; DATA CONFIDENTIALITY; DATA ENCRYPTION; DATA FILES; DATA SERVICES; DATA UTILIZATION; DIRECT CONTROL; ENCRYPTION TECHNIQUE; ENTERPRISE CUSTOMERS; INDIVIDUAL CUSTOMERS; KEYWORD SEARCH; NUMBER OF DATUM; OPERATIONAL OVERHEADS; PLAIN TEXT; RESEARCH DIRECTIONS; SEARCH FUNCTIONALITY; SECURITY AND PRIVACY; SERVICE-BASED; SIMILARITY SEARCH; SYSTEM USABILITY;

EID: 80052396625     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCSW.2011.16     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 5
    • 77953302790 scopus 로고    scopus 로고
    • Referenced online at June
    • Google, "Britney spears spelling correction," Referenced online at http://www.google.com/jobs/britney.html, June 2009.
    • (2009) Britney Spears Spelling Correction
  • 12
    • 77954747181 scopus 로고    scopus 로고
    • Bed-tree: An all-purpose index structure for string similarity search based on edit distance
    • Z. Zhang, M. Hadjieleftheriou, B. C. Ooi, and D. Srivastava, "Bed-tree: an all-purpose index structure for string similarity search based on edit distance," in Proc. of SIGMOD, 2010, pp. 915-926.
    • Proc. of SIGMOD, 2010 , pp. 915-926
    • Zhang, Z.1    Hadjieleftheriou, M.2    Ooi, B.C.3    Srivastava, D.4
  • 14
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. of INFOCOM, 2011.
    • Proc. of INFOCOM, 2011
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 17
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. of TCC, 2007, pp. 535-554.
    • Proc. of TCC, 2007 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 19
    • 0002619432 scopus 로고
    • Binary codes capable of correcting spurious insertions and deletions of ones
    • V. Levenshtein, "Binary codes capable of correcting spurious insertions and deletions of ones," Problems of Information Transmission, vol. 1, no. 1, pp. 8-17, 1965.
    • (1965) Problems of Information Transmission , vol.1 , Issue.1 , pp. 8-17
    • Levenshtein, V.1
  • 22
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 23
    • 80051864290 scopus 로고    scopus 로고
    • Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare
    • J. Sun, X. Zhu, C. Zhang, and Y. Fang, "Hcpp: Cryptography based secure ehr system for patient privacy and emergency healthcare," in Proc. of ICDCS, 2011.
    • Proc. of ICDCS, 2011
    • Sun, J.1    Zhu, X.2    Zhang, C.3    Fang, Y.4
  • 25
    • 84921683893 scopus 로고    scopus 로고
    • Authorized private keyword search over encrypted personal health records in cloud computing
    • M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted personal health records in cloud computing," in Proc. of ICDCS, 2011.
    • Proc. of ICDCS, 2011
    • Li, M.1    Yu, S.2    Cao, N.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.