메뉴 건너뛰기




Volumn , Issue , 2014, Pages 2112-2120

Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SEARCH ENGINES;

EID: 84904421834     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2014.6848153     Document Type: Conference Paper
Times cited : (376)

References (27)
  • 1
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," S&P 2000, vol. 8, pp. 44-55, 2000.
    • (2000) S&P 2000 , vol.8 , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 2
    • 84877939257 scopus 로고    scopus 로고
    • Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking
    • May
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, T. Hou, and H. Li, "Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking," in ASIACCS 2013, May 2013.
    • (2013) ASIACCS 2013
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, T.6    Li, H.7
  • 4
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," INFOCOM 2011, pp. 829-837, 2011.
    • (2011) INFOCOM 2011 , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 5
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Pairing 2007, pp. 2-22, 2007.
    • (2007) Pairing 2007 , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 6
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," Theory of Cryptography, vol. 4392, pp. 535-554, 2007.
    • (2007) Theory of Cryptography , vol.4392 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 7
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," ACNS 2004, vol. 3089, pp. 31-45, 2004.
    • (2004) ACNS 2004 , vol.3089 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 8
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," ICDCS 2010, pp. 253-262, 2010.
    • (2010) ICDCS 2010 , pp. 253-262
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 9
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," ACNS 2005, vol. 3531, pp. 442-455, 2005.
    • (2005) ACNS 2005 , vol.3531 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 10
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," CCS 2006, vol. 19, pp. 79-88, 2006.
    • (2006) CCS 2006 , vol.19 , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 13
    • 80055115224 scopus 로고    scopus 로고
    • Fuzzy keyword search on encrypted cloud storage data with small index
    • C. Liu, L. Zhu, L. Li, and Y. Tan, "Fuzzy keyword search on encrypted cloud storage data with small index," ICCCIS 2011, pp. 269-273, 2011.
    • (2011) ICCCIS 2011 , pp. 269-273
    • Liu, C.1    Zhu, L.2    Li, L.3    Tan, Y.4
  • 14
    • 80052398037 scopus 로고    scopus 로고
    • Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
    • M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," ICDCSW 2011, pp. 273-281, 2011.
    • (2011) ICDCSW 2011 , pp. 273-281
    • Chuah, M.1    Hu, W.2
  • 16
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, pp. 422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 18
    • 79956333848 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • Singapore, September 7-9
    • M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in SecureComm 2010, Singapore, September 7-9 2010.
    • (2010) SecureComm 2010
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 19
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA, USA, March
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in IEEE INFOCOM 2010, San Diego, CA, USA, March 2010.
    • (2010) IEEE INFOCOM 2010
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 20
    • 4544259509 scopus 로고    scopus 로고
    • Locality-sensitive hashing scheme based on p-stable distributions
    • M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," SCG 2004, 2004.
    • (2004) SCG 2004
    • Datar, M.1    Immorlica, N.2    Indyk, P.3    Mirrokni, V.S.4
  • 24
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," TCC 2009, pp. 457-473, 2009.
    • (2009) TCC 2009 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 25
    • 79952511284 scopus 로고    scopus 로고
    • Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
    • N. Attrapadung and B. Libert, "Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation," PKC 2010, vol. 6056, pp. 384-402, 2010.
    • (2010) PKC 2010 , vol.6056 , pp. 384-402
    • Attrapadung, N.1    Libert, B.2
  • 26
    • 84925827178 scopus 로고    scopus 로고
    • Privacy-preserving logarithmic-time search on encrypted data in cloud
    • Y. Lu, "Privacy-preserving logarithmic-time search on encrypted data in cloud," NDSS 2012, 2012.
    • (2012) NDSS 2012
    • Lu, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.