메뉴 건너뛰기




Volumn 35, Issue 3, 2012, Pages 927-933

Secure and privacy preserving keyword searching for cloud storage services

Author keywords

Cloud storage; Partial decipherment; Privacy preserving; Searchable encryption; Security

Indexed keywords

AUTHORIZED USERS; CAPITAL INVESTMENT; CLOUD SERVICES; COMMUNICATION OVERHEADS; ENCRYPTED DATA; ENCRYPTION SYSTEM; KEYWORD SEARCHING; PARTIAL DECIPHERMENT; PAY-AS-YOU-GO; PERFORMANCE ANALYSIS; PRIVACY PRESERVING; SECURITY; SECURITY AND PRIVACY ISSUES; SENSITIVE DATAS; STORAGE SERVICES; THIN CLIENTS; USER DATA;

EID: 84858038683     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2011.03.010     Document Type: Article
Times cited : (111)

References (11)
  • 2
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the weil pairing
    • [also as an extended abstract in Crypto, 2001]
    • D. Boneh, and M. Franklin Identity based encryption from the weil pairing SIAM Journal of Computing 32 3 2003 586 615 [also as an extended abstract in Crypto, 2001]
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 70749142805 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in database-service-provider model
    • Database Research Group at University of California, Irvine
    • Haclgiimfi H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in database-service-provider model. Technical Report TR-DB-02-02, Database Research Group at University of California, Irvine; 2002.
    • (2002) Technical Report TR-DB-02-02
    • Haclgiimfi, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 10
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the clouds
    • A. Weiss Computing in the clouds netWorker 11 4 2007 16 25
    • (2007) NetWorker , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1
  • 11
    • 33744913525 scopus 로고    scopus 로고
    • An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
    • Lecture notes in computer science
    • Zhu R, Yang G, Wong D. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. In: Internet and network economics: Proceedings of the first international workshop WINE, Lecture notes in computer science, vol. 3828; 2005. p. 50009.
    • (2005) Internet and Network Economics: Proceedings of the First International Workshop WINE , vol.3828 , pp. 50009
    • Zhu, R.1    Yang, G.2    Wong, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.