메뉴 건너뛰기




Volumn 32, Issue 4, 2013, Pages 723-738

Efficient multi-user keyword search over encrypted data in cloud computing

Author keywords

Cloud computing; Fuzzy; Keyword search; Multi user

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE;

EID: 84887939181     PISSN: 13359150     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (21)

References (31)
  • 2
    • 84863129241 scopus 로고    scopus 로고
    • Towards secure cloud computing architecture - A solution based on software protection mechanism
    • FUKUSHIMA, K.-KIYOMOTO, S.-MIYAKE, Y.: Towards secure cloud computing architecture - A solution based on software protection mechanism. Journal of Internet Services and Information Security, Vol. 1, 2011, pp. 4-17.
    • (2011) Journal of Internet Services and Information Security , vol.1 , pp. 4-17
    • Fukushima, K.-K.1    S-Miyake, Y.2
  • 5
    • 84871774928 scopus 로고    scopus 로고
    • Data integration in mediated service compositions
    • PAHL, C.-ZHU, Y.: Data integration in mediated service compositions. Computing and Informatics, Vol. 31, 2012, No. 6, pp. 1129-1149.
    • (2012) Computing and Informatics , vol.31 , Issue.6 , pp. 1129-1149
    • Pahl, C.-Z.Y.1
  • 6
    • 80052103219 scopus 로고    scopus 로고
    • Design and implementation of an intranet security and access control system in ubi-com
    • LEE, M.-CHO, N. -LEE, K.-KO, K.: Design and implementation of an intranet security and access control system in ubi-com. Computing and Informatics, Vol. 30, 2011, No. 3, pp. 419-428.
    • (2011) Computing and Informatics , vol.30 , Issue.3 , pp. 419-428
    • Lee, M.1    Cho, N.2    Lee, K.3    Ko, K.4
  • 10
    • 84870704143 scopus 로고    scopus 로고
    • A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud
    • LI, J.-JIA, C. -LI, J.-LIU, Z.: A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud. Proc. of INCoS 2012, pp. 1-7.
    • (2012) Proc. Of INCoS , pp. 1-7
    • Li, J.1    Jia, C.2    Li, J.3    Liu, Z.4
  • 11
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • Springer-Verlag
    • BELLARE, M.-BOLDYREVA, A.-O'NEILL, A.: Deterministic and efficiently searchable encryption. Proceedings of Crypto 2007, LNSC, Vol. 4622, Springer-Verlag 2007.
    • (2007) Proceedings of Crypto 2007, LNSC , vol.4622
    • Bellare, M.-B.1    A-O'Neill, A.2
  • 16
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • CHANG, Y.-C.-MITZENMACHER, M.: Privacy preserving keyword searches on remote encrypted data. Proc. of ACNS 2005.
    • (2005) Proc. Of ACNS
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 17
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • CURTMOLA, R.-GARAY, J. A.-KAMARA, S.-OSTROVSKY, R.: Searchable symmetric encryption: improved definitions and efficient constructions. Proc. of ACM CCS 2006.
    • (2006) Proc. Of ACM CCS
    • Curtmola, R.-G.1    A-Kamara, J.2    S-Ostrovsky, R.3
  • 18
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • BONEH, D.-WATERS, B.: Conjunctive, subset, and range queries on encrypted data. Proc. of TCC 2007, pp. 535-554.
    • Proc. Of TCC 2007 , pp. 535-554
    • Boneh D-Waters, B.1
  • 19
    • 84858377499 scopus 로고    scopus 로고
    • Private query on encrypted data in multi-user settings
    • BAO, F.-DENG, R. -DING, X.-YANG, Y.: Private query on encrypted data in multi-user settings. Proc. of ISPEC 2008.
    • (2008) Proc. Of ISPEC
    • Bao, F.1    Deng, R.2    Ding, X.3    Yang, Y.4
  • 24
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • GOYAL, V.-PANDEY, O. -SAHAI, A.-WATERS, B.: Attribute-based encryption for fine-grained access control of encrypted data. CCS '06, ACM 2006, pp. 89-98.
    • (2006) CCS '06, ACM , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 25
    • 0002619432 scopus 로고
    • Binary codes capable of correcting spurious insertions and deletions of ones
    • LEVENSHTEIN, V.: Binary codes capable of correcting spurious insertions and deletions of ones. Problems of Information Transmission, Vol. 1, 1965, No. 1, pp. 8-17.
    • (1965) Problems of Information Transmission , vol.1 , Issue.1 , pp. 8-17
    • Levenshtein, V.1
  • 26
    • 84865633750 scopus 로고    scopus 로고
    • Efficient interactive fuzzy keyword search
    • JI, S.-LI, G. -LI, C.-FENG, J.: Efficient interactive fuzzy keyword search. Proc. of WWW 2009.
    • (2009) Proc. Of WWW
    • Ji, S.1    Li, G.2    Li, C.3    Feng, J.4
  • 28
    • 85104914015 scopus 로고    scopus 로고
    • Efficient exact set-similarity joins
    • ARASU, A.-GANTI, V.-KAUSHIK, R.: Efficient exact set-similarity joins. Proc. of VLDB 2006, pp. 918-929.
    • (2006) Proc. Of VLDB , pp. 918-929
    • Arasu, A.-G.1    V-Kaushik, R.2
  • 30
    • 0014814325 scopus 로고
    • Space/Time Trade-Offs in hash coding with allowable errors
    • BLOOM, B.: Space/Time Trade-Offs in hash coding with allowable errors. Communications of the ACM, Vol. 13, 1970, No. 7, pp. 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.