메뉴 건너뛰기




Volumn , Issue , 2011, Pages 269-273

Fuzzy keyword search on encrypted cloud storage data with small index

Author keywords

cloud storage; dictionary based fuzzy set; fuzzy keyword search; index

Indexed keywords

COMMUNICATION OVERHEADS; DICTIONARY-BASED FUZZY SET; EDIT DISTANCE; ENCRYPTED DATA; ENCRYPTION SCHEMES; INDEX; INFOCOM; KEYWORD SEARCH; SIZE RATIO; SPELLING ERRORS; STORAGE SYSTEMS; SYSTEM USABILITY;

EID: 80055115224     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCIS.2011.6045073     Document Type: Conference Paper
Times cited : (78)

References (13)
  • 2
    • 33244488406 scopus 로고    scopus 로고
    • Secure Indexes
    • Report 2003/216
    • E.-J. Goh, "Secure Indexes," Cryptology ePrint Archive, Report 2003/216, 2003, http://eprint.iacr.org/.
    • (2003) Cryptology ePrint Archive
    • Goh, E.-J.1
  • 4
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and Efficiently Searchable Encryption
    • Proc. of Crypto 2007, Springer-Verlag
    • M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and Efficiently Searchable Encryption," in Proc. of Crypto 2007, Volume 4622 of LNCS. Springer-Verlag, 2007.
    • (2007) LNCS , vol.4622
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 5
    • 33746214783 scopus 로고    scopus 로고
    • Efficient Conjunctive Keyword Search on Encrypted Data Storage System
    • Public Key Infrastructure
    • J. W. Byun, D. H. Lee, and J. Lim, "Efficient Conjunctive Keyword Search on Encrypted Data Storage System," Lecture Notes in Computer Science, Volume 4043, Public Key Infrastructure, Pages 184-196, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4043 , pp. 184-196
    • Byun, J.W.1    Lee, D.H.2    Lim, J.3
  • 7
    • 38349070353 scopus 로고    scopus 로고
    • Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
    • Cryptology and Network Security
    • R. Zhang, and H. Imai, "Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption," Lecture Notes in Computer Science, Volume 4856, Cryptology and Network Security, Pages 159-174, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4856 , pp. 159-174
    • Zhang, R.1    Imai, H.2
  • 8
    • 45749087352 scopus 로고    scopus 로고
    • Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
    • Applied Cryptography and Network Security
    • N. Borisov, and S. Mitra, "Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance," Lecture Notes in Computer Science, Volume 5037, Applied Cryptography and Network Security, Pages 373-391, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5037 , pp. 373-391
    • Borisov, N.1    Mitra, S.2
  • 9
    • 26844445270 scopus 로고    scopus 로고
    • Secure Index Search for Groups
    • Trust, Privacy, and Security in Digital Business
    • H.-A. Park, J. W. Byum, and D. H. Lee, "Secure Index Search for Groups," Lecture Notes in Computer Science, Volume 3592, Trust, Privacy, and Security in Digital Business, Pages 128-140, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3592 , pp. 128-140
    • Park, H.-A.1    Byum, J.W.2    Lee, D.H.3
  • 11
    • 80055107187 scopus 로고    scopus 로고
    • Different Search Strategies on Encrypted Data Compared. Data-Centric Systems and Applications
    • R. Brinkman. "Different Search Strategies on Encrypted Data Compared. Data-Centric Systems and Applications," Security, Privacy, and Trust in Modern Data Management, Part 3, Pages 183-196, 2007.
    • (2007) Security, Privacy, and Trust in Modern Data Management, Part 3 , pp. 183-196
    • Brinkman, R.1
  • 13
    • 84912026197 scopus 로고    scopus 로고
    • Link-Assistant.com, Referenced online at
    • Link-Assistant.com, "Stop Words: Words Ignored By Search Engines," Referenced online at http://www.link-assistant.com/seostop-words. html
    • Stop Words: Words Ignored by Search Engines


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.