메뉴 건너뛰기




Volumn 30, Issue 1, 2014, Pages 179-190

Efficient multi-keyword ranked query over encrypted data in cloud computing

Author keywords

Cloud computing; Data encryption; Multi keyword query; Privacy preserving; Ranked query; Top k query

Indexed keywords

DATA ENCRYPTION; MULTI KEYWORDS; PRIVACY PRESERVING; RANKED QUERY; TOP-K QUERY;

EID: 84888339077     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2013.06.029     Document Type: Article
Times cited : (103)

References (34)
  • 1
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis, and D. Lekkas Addressing cloud computing security issues Future Gener. Comput. Syst. 28 3 2012 583 592
    • (2012) Future Gener. Comput. Syst. , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 2
    • 84870366061 scopus 로고    scopus 로고
    • Identity-based data storage in cloud computing
    • Identity-based data storage in cloud computing Future Gener. Comput. Syst. 29 3 2013 673 681
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.3 , pp. 673-681
  • 3
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • J. Ioannidis, A. Keromytis, M. Yung, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • Y.-C. Chang, and M. Mitzenmacher Privacy preserving keyword searches on remote encrypted data J. Ioannidis, A. Keromytis, M. Yung, Applied Cryptography and Network Security Lecture Notes in Computer Science vol. 3531 2005 Springer Berlin Heidelberg 391 421
    • (2005) Applied Cryptography and Network Security , vol.3531 VOL. , pp. 391-421
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 9
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters Attribute-based encryption for fine-grained access control of encrypted data Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS'06 2006 ACM New York, NY, USA 89 98 (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 15
    • 77954647813 scopus 로고    scopus 로고
    • Generalized distances between rankings
    • R. Kumar, S. Vassilvitskii, Generalized distances between rankings, in: WWW, 2010, pp. 571-580.
    • (2010) WWW , pp. 571-580
    • Kumar, R.1    Vassilvitskii, S.2
  • 16
    • 0000159640 scopus 로고
    • A statistical approach to mechanized encoding and searching of literary information
    • H.P. Luhn A statistical approach to mechanized encoding and searching of literary information IBM J. Res. Dev. 1 4 1957 309 317
    • (1957) IBM J. Res. Dev. , vol.1 , Issue.4 , pp. 309-317
    • Luhn, H.P.1
  • 17
    • 0035024125 scopus 로고    scopus 로고
    • Heavy tails, generalized coding, and optimal Web layout
    • X.Z. Jie, J. Yu, and J. Doyle Heavy tails, generalized coding, and optimal web layout IEEE INFOCOM 2001 2001 IEEE Press 1617 1626 (Pubitemid 32485808)
    • (2001) Proceedings - IEEE INFOCOM , vol.3 , pp. 1617-1626
    • Zhu, X.1    Yu, J.2    Doyle, J.3
  • 19
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Seb, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • S. Kamara, and K. Lauter Cryptographic cloud storage R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Seb, Financial Cryptography and Data Security Lecture Notes in Computer Science vol. 6054 2010 Springer Berlin Heidelberg 136 149
    • (2010) Financial Cryptography and Data Security , vol.6054 VOL. , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 22
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • DOI 10.1145/1180405.1180417, 1180417, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06 2006 ACM New York, NY, USA 79 88 (Pubitemid 47131358)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 24
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • C. Cachin, J. Camenisch, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano Public key encryption with keyword search C. Cachin, J. Camenisch, Advances in Cryptology - EUROCRYPT'04 Lecture Notes in Computer Science vol. 3027 2004 Springer Berlin Heidelberg 506 522
    • (2004) Advances in Cryptology - EUROCRYPT'04 , vol.3027 VOL. , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 26
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • Information Security Applications - 5th International Workshop, WISA 2004
    • D. Park, K. Kim, and P. Lee Public key encryption with conjunctive field keyword search C. Lim, M. Yung, Information Security Applications Lecture Notes in Computer Science vol. 3325 2005 Springer Berlin Heidelberg 73 86 (Pubitemid 41190803)
    • (2005) Lecture Notes in Computer Science , vol.3325 , pp. 73-86
    • Park, D.J.1    Kim, K.2    Lee, P.J.3
  • 27
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • M. Jakobsson, M. Yung, J. Zhou, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • P. Golle, J. Staddon, and B. Waters Secure conjunctive keyword search over encrypted data M. Jakobsson, M. Yung, J. Zhou, Applied Cryptography and Network Security Lecture Notes in Computer Science vol. 3089 2004 Springer Berlin Heidelberg 31 45
    • (2004) Applied Cryptography and Network Security , vol.3089 VOL. , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 28
    • 33646736337 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • S. Qing, W. Mao, J. Lapez, G. Wang, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • L. Ballard, S. Kamara, and F. Monrose Achieving efficient conjunctive keyword searches over encrypted data S. Qing, W. Mao, J. Lapez, G. Wang, Information and Communications Security Lecture Notes in Computer Science vol. 3783 2005 Springer Berlin Heidelberg 414 426
    • (2005) Information and Communications Security , vol.3783 VOL. , pp. 414-426
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 29
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • S. Vadhan, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • D. Boneh, and B. Waters Conjunctive, subset, and range queries on encrypted data S. Vadhan, Theory of Cryptography Lecture Notes in Computer Science vol. 4392 2007 Springer Berlin Heidelberg 535 554
    • (2007) Theory of Cryptography , vol.4392 VOL. , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 31
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • Y. Hwang, and P. Lee Public key encryption with conjunctive keyword search and its extension to a multi-user system T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto, Pairing-Based Cryptography, Pairing 2007 Lecture Notes in Computer Science vol. 4575 2007 Springer Berlin Heidelberg 2 22
    • (2007) Pairing-Based Cryptography, Pairing 2007 , vol.4575 VOL. , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 33
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • H. Gilbert, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption H. Gilbert, Advances in Cryptology, EUROCRYPT 2010 Lecture Notes in Computer Science vol. 6110 2010 Springer Berlin Heidelberg 62 91
    • (2010) Advances in Cryptology, EUROCRYPT 2010 , vol.6110 VOL. , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 34
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • O. Reingold, Lecture Notes in Computer Science Springer Berlin Heidelberg
    • E. Shen, E. Shi, and B. Waters Predicate privacy in encryption systems O. Reingold, Theory of Cryptography Lecture Notes in Computer Science vol. 5444 2009 Springer Berlin Heidelberg 457 473
    • (2009) Theory of Cryptography , vol.5444 VOL. , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.