메뉴 건너뛰기




Volumn , Issue , 2013, Pages 71-81

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking

Author keywords

cloud computing; multi keyword search; privacy preserving search; similarity based ranking

Indexed keywords

COSINE SIMILARITY MEASURES; EFFECTIVENESS AND EFFICIENCIES; EXPERIMENTAL EVALUATION; MULTI KEYWORDS; PRIVACY PRESERVING; PRIVACY REQUIREMENTS; SEARCH RESULT RANKINGS; SIMILARITY-BASED RANKING;

EID: 84877939257     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484322     Document Type: Conference Paper
Times cited : (319)

References (35)
  • 2
    • 79952511284 scopus 로고    scopus 로고
    • Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
    • N. Attrapadung and B. Libert. Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In Proc. of PKC, pages 384-402, 2010.
    • (2010) Proc. of PKC , pp. 384-402
    • Attrapadung, N.1    Libert, B.2
  • 4
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC, pages 535-554, 2007.
    • (2007) Proc. of TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 5
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proc. of IEEE INFOCOM, pages 829-837, 2011.
    • (2011) Proc. of IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 6
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Proc. of ACNS, pages 391-421, 2005.
    • (2005) Proc. of ACNS , pp. 391-421
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 9
    • 0018480749 scopus 로고
    • Ubiquitous b-tree
    • D. Comer. Ubiquitous b-tree. ACM computing surveys, 11(2):121-137, 1979.
    • (1979) ACM Computing Surveys , vol.11 , Issue.2 , pp. 121-137
    • Comer, D.1
  • 10
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In Proc. of ACM CCS, pages 79-88, 2006.
    • (2006) Proc. of ACM CCS , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 12
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B. R. Waters. Secure conjunctive keyword search over encrypted data. In Proc. of ACNS, pages 31-45, 2004.
    • (2004) Proc. of ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.R.3
  • 13
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. Hwang and P. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing, pages 2-22, 2007.
    • (2007) Pairing , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 15
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In Proc. of SecureComm, pages 89-106, 2010.
    • (2010) Proc. of SecureComm , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 17
    • 84877956701 scopus 로고    scopus 로고
    • Privacy-preserving logarithmic-time search on encrypted data in cloud
    • Y. Lu. Privacy-preserving logarithmic-time search on encrypted data in cloud. In Proc. of NDSS, 2012.
    • Proc. of NDSS, 2012
    • Lu, Y.1
  • 19
    • 54249111543 scopus 로고    scopus 로고
    • Extending fagin's algorithm for more users based on multidimensional b-tree
    • M. Ondreička and J. Pokorný. Extending fagin's algorithm for more users based on multidimensional b-tree. In Proc. of ADBIS, pages 199-214, 2008.
    • (2008) Proc. of ADBIS , pp. 199-214
    • Ondreička, M.1    Pokorný, J.2
  • 22
    • 0020277962 scopus 로고
    • Multidimensional b-trees for associative searching in database systems
    • P. Scheuermann and M. Ouksel. Multidimensional b-trees for associative searching in database systems. Information systems, 7(2):123-137, 1982.
    • (1982) Information Systems , vol.7 , Issue.2 , pp. 123-137
    • Scheuermann, P.1    Ouksel, M.2
  • 23
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters. Predicate privacy in encryption systems. In Proc. of TCC, pages 457-473, 2009.
    • (2009) Proc. of TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 27
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proc. of S&P, pages 44-55, 2000.
    • (2000) Proc. of S&P , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 29
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8):1467-1479, 2012.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 32
    • 84881354487 scopus 로고    scopus 로고
    • Secure nearest neighbor revisited
    • to appear in
    • B. Yao, F. Li, and X. Xiao. Secure nearest neighbor revisited. http://www.cs.utah.edu/∼lifeifei/papers/snnicde.pdf, to appear in ICDE, 2013.
    • (2013) ICDE
    • Yao, B.1    Li, F.2    Xiao, X.3
  • 33
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proc. of IEEE INFOCOM, pages 1-9, 2010.
    • (2010) Proc. of IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 34
    • 70349110963 scopus 로고    scopus 로고
    • Zerber+r: Top-k retrieval from a confidential index
    • S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski. Zerber+r: Top-k retrieval from a confidential index. In Proc. of EDBT, pages 439-449, 2009.
    • (2009) Proc. of EDBT , pp. 439-449
    • Zerr, S.1    Olmedilla, D.2    Nejdl, W.3    Siberski, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.