메뉴 건너뛰기




Volumn 32, Issue 1, 2014, Pages 119-160

An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking

Author keywords

Cloud storage; Multi keyword; Privacy preserving keyword search; Ranking

Indexed keywords

CLOUD STORAGES; CRYPTOGRAPHIC TECHNIQUES; INFORMATION SEARCH AND RETRIEVAL; KEYWORD SEARCH; MULTI KEYWORDS; RANKING; SECURITY AND PRIVACY; SENSITIVE INFORMATIONS;

EID: 84897629494     PISSN: 09268782     EISSN: 15737578     Source Type: Journal    
DOI: 10.1007/s10619-013-7123-9     Document Type: Article
Times cited : (44)

References (31)
  • 1
    • 84864128069 scopus 로고    scopus 로고
    • Efficient and secure ranked multi-keyword search on encrypted cloud data
    • ACM New York 10.1145/2320765.2320820
    • Örencik, C.; Savaş, E.: Efficient and secure ranked multi-keyword search on encrypted cloud data. In: Proceedings of the 2012 Joint EDBT/ICDT Workshops, pp. 186-195. ACM, New York (2012)
    • (2012) Proceedings of the 2012 Joint EDBT/ICDT Workshops , pp. 186-195
    • Örencik, C.1    Savaş, E.2
  • 3
    • 38049138213 scopus 로고    scopus 로고
    • Public key encryption that allows PIR queries
    • Lecture Notes in Computer Science 4622 Springer Berlin 10.1007/978-3-540-74143-5-4
    • Boneh, D.; Kushilevitz, E.; Ostrovsky, R.; Skeith, W.: Public key encryption that allows PIR queries. In: Advances in Cryptology (CRYPTO 2007). Lecture Notes in Computer Science, vol. 4622, pp. 50-67. Springer, Berlin (2007)
    • (2007) Advances in Cryptology (CRYPTO 2007) , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith, W.4
  • 4
    • 77954567837 scopus 로고    scopus 로고
    • First CPIR protocol with data-dependent computation
    • Springer Berlin
    • Lipmaa, H.: First CPIR protocol with data-dependent computation. In: Information, Security and Cryptology (ICISC 2009), pp. 193-210. Springer, Berlin (2009)
    • (2009) Information, Security and Cryptology (ICISC 2009) , pp. 193-210
    • Lipmaa, H.1
  • 5
    • 79955529260 scopus 로고    scopus 로고
    • Multi-query computationally-private information retrieval with constant communication rate
    • Groth, J.; Kiayias, A.; Lipmaa, H.: Multi-query computationally-private information retrieval with constant communication rate. In: PKC, pp. 107-123 (2010)
    • (2010) PKC , pp. 107-123
    • Groth, J.1    Kiayias, A.2    Lipmaa, H.3
  • 6
    • 79251555651 scopus 로고    scopus 로고
    • Efficient computationally private information retrieval from anonymity or trapdoor groups
    • Trostle, J.T.; Parrish, A.: Efficient computationally private information retrieval from anonymity or trapdoor groups. In: ISC '10, pp. 114-128 (2010)
    • (2010) ISC '10 , pp. 114-128
    • Trostle, J.T.1    Parrish, A.2
  • 11
    • 84870787249 scopus 로고    scopus 로고
    • Windows live mesh (2012). http://windows.microsoft.com/en-US/windows- live/essentials-other-programs?T1=t4
    • (2012) Windows Live Mesh
  • 12
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Springer Berlin 10.1007/11496137-30
    • Chang, Y.-C.; Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442-455. Springer, Berlin (2005)
    • (2005) Applied Cryptography and Network Security , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 14
    • 1942420748 scopus 로고    scopus 로고
    • Oblivious keyword search
    • 10.1016/j.jco.2003.08.023 1059.68050 2067437
    • Ogata, W.; Kurosawa, K.: Oblivious keyword search. J. Complex. 20, 356-371 (2004)
    • (2004) J. Complex. , vol.20 , pp. 356-371
    • Ogata, W.1    Kurosawa, K.2
  • 16
    • 0010402853 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • 2001
    • Boneh, D.; Franklin, M.K.: Identity based encryption from the Weil pairing. In: IACR Cryptology ePrint Archive, vol. 2001, p. 90 (2001)
    • (2001) IACR Cryptology EPrint Archive , pp. 90
    • Boneh, D.1    Franklin, M.K.2
  • 17
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • Wang, C.; Cao, N.; Li, J.; Ren, K.; Lou, W.: Secure ranked keyword search over encrypted cloud data. In: ICDCS'10, pp. 253-262 (2010)
    • (2010) ICDCS'10 , pp. 253-262
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 19
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Cao, N.; Wang, C.; Li, M.; Ren, K.; Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)
    • (2011) IEEE INFOCOM
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 20
    • 78649325305 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • 10.1016/j.jnca.2010.07.007
    • Zhang, B.; Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1), 262-267 (2011)
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 262-267
    • Zhang, B.1    Zhang, F.2
  • 21
    • 70350676849 scopus 로고    scopus 로고
    • An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data
    • Lecture Notes in Computer Science Springer Berlin 10.1007/978-3-642- 00306-6-11
    • Wang, P.; Wang, H.; Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Information Security Applications. Lecture Notes in Computer Science, pp. 145-159. Springer, Berlin (2009)
    • (2009) Information Security Applications , pp. 145-159
    • Wang, P.1    Wang, H.2    Pieprzyk, J.3
  • 22
    • 84876811202 scopus 로고    scopus 로고
    • Rcv1: A new benchmark collection for text categorization research
    • Lewis, D.D.; Yang, Y.; Rose, T.G.; Li, F.: Rcv1: a new benchmark collection for text categorization research. J. Mach. Learn. Res. 5, 361-397 (2004)
    • (2004) J. Mach. Learn. Res. , vol.5 , pp. 361-397
    • Lewis, D.D.1    Yang, Y.2    Rose, T.G.3    Li, F.4
  • 27
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • 10.1007/s00778-011-0245-7
    • Hore, B.; Mehrotra, S.; Canim, M.; Kantarcioglu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21, 333-358 (2012)
    • (2012) VLDB J. , vol.21 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 29
    • 84870655838 scopus 로고    scopus 로고
    • Google trends (2012). http://www.google.com/trends/
    • (2012) Google Trends
  • 31
    • 0002848777 scopus 로고    scopus 로고
    • Exploring the similarity space
    • 32
    • Zobel, J.; Moffat, A.: Exploring the similarity space. In: SIGIR FORUM, vol. 32, pp. 18-34 (1998)
    • (1998) SIGIR FORUM , pp. 18-34
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.