메뉴 건너뛰기




Volumn 6879 LNCS, Issue , 2011, Pages 528-547

A light-weight solution to preservation of access pattern privacy in un-trusted clouds

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD SECURITY; CLOUD STORAGE; SENSITIVE DATA;

EID: 80053005931     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23822-2_29     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 2
    • 85165857969 scopus 로고    scopus 로고
    • Baidu, http://passport.baidu.com/?business&aid=6&un=chenfoxlord#7
  • 3
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 (1970)
    • (1970) Communications of the ACM , vol.13
    • Bloom, B.H.1
  • 4
    • 0003160114 scopus 로고    scopus 로고
    • Computationally private information retrieval
    • Chor, B., Gilboa, N.: Computationally private information retrieval. In: Proc. STOC 1997 (1997)
    • (1997) Proc. STOC 1997
    • Chor, B.1    Gilboa, N.2
  • 6
    • 57049157741 scopus 로고    scopus 로고
    • A framework for the analysis of mix-based steganographic file systems
    • Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
    • Diaz, C., Troncoso, C., Preneel, B.: A framework for the analysis of mix-based steganographic file systems. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 428-445. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 428-445
    • Diaz, C.1    Troncoso, C.2    Preneel, B.3
  • 8
    • 0002337124 scopus 로고
    • Towards a theory of software protection and simulation by oblivious rams
    • Goldreich, O.: Towards a theory of software protection and simulation by oblivious rams. In: Proc. STOC 1987 (1987)
    • (1987) Proc. STOC 1987
    • Goldreich, O.1
  • 9
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious ram
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious ram. In: JACM 1996 (1996)
    • (1996) JACM 1996
    • Goldreich, O.1    Ostrovsky, R.2
  • 15
    • 85141026002 scopus 로고    scopus 로고
    • On the computational practicality of private information retrieval
    • Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Proc. NDSS 2007 (2007)
    • (2007) Proc. NDSS 2007
    • Sion, R.1    Carbunar, B.2
  • 16
    • 49949108041 scopus 로고    scopus 로고
    • Traffic analysis attacks on a continuously-observable steganographic file system
    • Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. Springer, Heidelberg
    • Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B.: Traffic analysis attacks on a continuously-observable steganographic file system. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 220-236. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4567 , pp. 220-236
    • Troncoso, C.1    Diaz, C.2    Dunkelman, O.3    Preneel, B.4
  • 18
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proc. IWQoS 2009 (2009)
    • (2009) Proc. IWQoS 2009
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 19
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proc. ICDCS 2010 (2010)
    • (2010) Proc. ICDCS 2010
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 20
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Proc. CCS 2008 (2008)
    • (2008) Proc. CCS 2008
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 22
    • 85165862579 scopus 로고    scopus 로고
    • Youtube, http://www.youtube.com/user/supercwm
    • Youtube
  • 23
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained access control in cloud computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained access control in cloud computing. In: Proc. INFOCOM 2010 (2010)
    • (2010) Proc. INFOCOM 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 24
    • 2442485674 scopus 로고    scopus 로고
    • Hiding data accesses in steganographic file system
    • Zhou, X., Pang, H., Tan, K.L.: Hiding data accesses in steganographic file system. In: Proc. ICDE 2004 (2004)
    • (2004) Proc. ICDE 2004
    • Zhou, X.1    Pang, H.2    Tan, K.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.