메뉴 건너뛰기




Volumn 265, Issue , 2014, Pages 176-188

Search pattern leakage in searchable encryption: Attacks and new construction

Author keywords

Cloud computing; Fake query; Grouping based construction; Search pattern; Searchable encryption

Indexed keywords

CLASSICAL METHODS; FAKE QUERY; NEW CONSTRUCTIONS; REAL-WORLD SCENARIO; REMOTE ENCRYPTED DATA; SEARCH PATTERNS; SEARCHABLE ENCRYPTIONS; STATISTICAL INFORMATION;

EID: 84893808472     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.11.021     Document Type: Article
Times cited : (183)

References (25)
  • 1
    • 84893753996 scopus 로고    scopus 로고
    • AOL Search-log. < http://www.gregsadetsky.com/aol-data/ >.
    • AOL Search-log
  • 2
    • 78651468316 scopus 로고    scopus 로고
    • Google Trends. < http://www.google.com/trends/ >.
    • Google Trends
  • 3
    • 84893798495 scopus 로고    scopus 로고
    • Sogou Search-log. < http://www.sogou.com/labs/dl/q-e.html/ >.
    • Sogou Search-log
  • 4
    • 84874189347 scopus 로고    scopus 로고
    • Stopword List. < http://www.ranks.nl/resources/stopwords.html/ >.
    • Stopword List
  • 5
    • 45749099677 scopus 로고    scopus 로고
    • Enron Email Dataset, 2009. < http://www.cs.cmu.edu/enron/ >.
    • (2009) Enron Email Dataset
  • 7
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B.H. Bloom Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 7 1970 422 426
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 9
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Lecture Notes in Computer Science Springer
    • Y.-C. Chang, and M. Mitzenmacher Privacy preserving keyword searches on remote encrypted data Applied Cryptography and Network Security (ACNS'05) Lecture Notes in Computer Science vol. 3531 2005 Springer 391 421
    • (2005) Applied Cryptography and Network Security (ACNS'05) , vol.3531 VOL. , pp. 391-421
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 10
    • 78650834524 scopus 로고    scopus 로고
    • Structured encryption and controlled disclosure
    • Lecture Notes in Computer Science Springer
    • M. Chase, and S. Kamara Structured encryption and controlled disclosure A dvances in Cryptology - ASIACRYPT'10 Lecture Notes in Computer Science vol. 6477 2010 Springer 577 594
    • (2010) A Dvances in Cryptology - ASIACRYPT'10 , vol.6477 VOL. , pp. 577-594
    • Chase, M.1    Kamara, S.2
  • 11
    • 81255134906 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky Searchable symmetric encryption: improved definitions and efficient constructions J. Comput. Sec. 19 5 2011 895 934
    • (2011) J. Comput. Sec. , vol.19 , Issue.5 , pp. 895-934
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 12
    • 84876842378 scopus 로고    scopus 로고
    • Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    • L. Fang, W. Susilo, C. Ge, and J. Wang Public key encryption with keyword search secure against keyword guessing attacks without random oracle Inform. Sci. 238 2013 221 241
    • (2013) Inform. Sci. , vol.238 , pp. 221-241
    • Fang, L.1    Susilo, W.2    Ge, C.3    Wang, J.4
  • 14
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • O. Goldreich, and R. Ostrovsky Software protection and simulation on oblivious rams J. ACM 43 3 1996 431 473
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 16
    • 77956137294 scopus 로고    scopus 로고
    • Cryptographic cloud storage
    • Lecture Notes in Computer Science Springer
    • S. Kamara, and K. Lauter Cryptographic cloud storage Financial Cryptography Workshops Lecture Notes in Computer Science 6054 2010 Springer 136 149
    • (2010) Financial Cryptography Workshops , vol.6054 , pp. 136-149
    • Kamara, S.1    Lauter, K.2
  • 20
    • 84861580700 scopus 로고    scopus 로고
    • Generic construction of designated tester public-key encryption with keyword search
    • H.S. Rhee, J.H. Park, and D.H. Lee Generic construction of designated tester public-key encryption with keyword search Inform. Sci. 205 2012 93 109
    • (2012) Inform. Sci. , vol.205 , pp. 93-109
    • Rhee, H.S.1    Park, J.H.2    Lee, D.H.3
  • 23
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE Trans. Parallel Distrib. Syst. 23 8 2012 1467 1479
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 24
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • C. Wang, K. Ren, S. Yu, K.M.R. Urs, Achieving usable and privacy-assured similarity search over outsourced cloud data, in: IEEE INFOCOM, 2012, pp. 451-459.
    • (2012) IEEE INFOCOM , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.M.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.