메뉴 건너뛰기




Volumn 8544 LNCS, Issue , 2014, Pages 115-130

TMDS: Thin-model data sharing scheme supporting keyword search in cloud storage

Author keywords

access control; cloud storage; data sharing; searchable encryption

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DIGITAL STORAGE;

EID: 84904202504     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-08344-5_8     Document Type: Conference Paper
Times cited : (20)

References (23)
  • 3
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. In: Proc. IEEE INFOCOM, pp. 534-542 (2010)
    • (2010) Proc. IEEE INFOCOM , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 4
    • 84884802064 scopus 로고    scopus 로고
    • Fine-grained access control based on outsourced attribute-based encryption
    • Crampton, J., Jajodia, S., Mayes, K. (eds.) LNCS, Springer, Heidelberg
    • Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained Access Control based on Outsourced Attribute-based Encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592-609. Springer, Heidelberg (2013)
    • (2013) Esorics 2013 , vol.8134 , pp. 592-609
    • Li, J.1    Chen, X.2    Li, J.3    Jia, C.4    Ma, J.5    Lou, W.6
  • 7
  • 11
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • Cachin, C., Camenisch, J.L. (eds.) LNCS, Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
    • (2004) Eurocrypt 2004 , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 12
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) LNCS, Springer, Heidelberg
    • Hwang, Y.-H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2-22. Springer, Heidelberg (2007)
    • (2007) Pairing 2007 , vol.4575 , pp. 2-22
    • Hwang, Y.-H.1    Lee, P.J.2
  • 13
    • 84887939181 scopus 로고    scopus 로고
    • Efficient multi-user keyword search over encrypted data in cloud computing
    • Li, J., Chen, X.: Efficient Multi-user Keyword Search Over Encrypted Data in Cloud Computing. Computing and Informatics 32(4), 723-738 (2013)
    • (2013) Computing and Informatics , vol.32 , Issue.4 , pp. 723-738
    • Li, J.1    Chen, X.2
  • 14
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • Li, J., Wang, Q., Wang, C.: Fuzzy keyword search over encrypted data in cloud computing. In: Proc. IEEE INFOCOM, pp. 1-5 (2010)
    • (2010) Proc. IEEE INFOCOM , pp. 1-5
    • Li, J.1    Wang, Q.2    Wang, C.3
  • 15
    • 80052760893 scopus 로고    scopus 로고
    • Conjunctive wildcard search over encrypted data
    • Jonker, W., Petkovíc, M. (eds.) LNCS, Springer, Heidelberg
    • Bösch, C., Brinkman, R., Hartel, P., Jonker, W.: Conjunctive wildcard search over encrypted data. In: Jonker, W., Petkovíc, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 114-127. Springer, Heidelberg (2011)
    • (2011) SDM 2011 , vol.6933 , pp. 114-127
    • Bösch, C.1    Brinkman, R.2    Hartel, P.3    Jonker, W.4
  • 16
    • 84864659703 scopus 로고    scopus 로고
    • Multi-user keyword search scheme for secure data sharing with fine-grained access control
    • Kim, H. (ed.) LNCS, Springer, Heidelberg
    • Zhao, F., Nishide, T., Sakurai, K.: Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 406-418. Springer, Heidelberg (2012)
    • (2012) ICISC 2011 , vol.7259 , pp. 406-418
    • Zhao, F.1    Nishide, T.2    Sakurai, K.3
  • 18
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. IEEE INFOCOM, pp. 525-533 (2010)
    • (2010) Proc. IEEE INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 19
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Shoup, V. (ed.) LNCS, Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) Crypto 2005 , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 21
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boyd, C. (ed.) LNCS, Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) Asiacrypt 2001 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 23
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Li, M., Lou,W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wireless Communications 17(1), 51-58 (2010)
    • (2010) IEEE Wireless Communications , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.