메뉴 건너뛰기




Volumn , Issue , 2014, Pages 226-234

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; SEARCH ENGINES;

EID: 84904444112     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2014.6847943     Document Type: Conference Paper
Times cited : (204)

References (29)
  • 1
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of INFOCOM. IEEE, 2010, pp. 1-9.
    • (2010) Proc. of INFOCOM. IEEE , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 2
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attributebased encryption," IEEE TPDS, vol. 24, no. 1, pp. 131-143, 2013.
    • (2013) IEEE TPDS , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 4
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of S&P. IEEE, 2000, pp. 44-55.
    • (2000) Proc. of S&P. IEEE , pp. 44-55
    • Song, D.X.1    Wagner, D.2    Perrig, A.3
  • 5
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Y. Huang, D. Evans, J. Katz, and L. Malka, "Faster secure two-party computation using garbled circuits." in USENIX Security Symposium, vol. 201, no. 1, 2011.
    • (2011) USENIX Security Symposium , vol.201 , Issue.1
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 7
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. of CCS. ACM, 2006, pp. 79-88.
    • (2006) Proc. of CCS. ACM , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 9
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. of INFOCOM. IEEE, 2011, pp. 829-837.
    • (2011) Proc. of INFOCOM. IEEE , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 10
    • 84877939257 scopus 로고    scopus 로고
    • Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacypreserving multi-keyword text search in the cloud supporting similaritybased ranking," in Proc. of ASIACCS. ACM, 2013, pp. 71-82.
    • (2013) Proc. of ASIACCS. ACM , pp. 71-82
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 12
    • 84863181194 scopus 로고    scopus 로고
    • Multi-user private keyword search for cloud computing
    • Y. Yang, H. Lu, and J. Weng, "Multi-user private keyword search for cloud computing," in Proc. of CloudCom. IEEE, 2011, pp. 264-271.
    • (2011) Proc. of CloudCom. IEEE , pp. 264-271
    • Yang, Y.1    Lu, H.2    Weng, J.3
  • 13
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Springer
    • Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Proc. of Pairing. Springer, 2007, pp. 2-22.
    • (2007) Proc. of Pairing , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 14
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Springer
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. of EUROCRYPT. Springer, 1998, pp. 127-144.
    • (1998) Proc. of EUROCRYPT , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 15
    • 85033460636 scopus 로고    scopus 로고
    • Plutus: Scalable secure file sharing on untrusted storage
    • M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable secure file sharing on untrusted storage," in Proc. of FAST, vol. 42, 2003, pp. 29-42.
    • (2003) Proc. of FAST , vol.42 , pp. 29-42
    • Kallahalla, M.1    Riedel, E.2    Swaminathan, R.3    Wang, Q.4    Fu, K.5
  • 17
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • Springer
    • P. Golle, J. Staddon, and B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. of ACNS. Springer, 2004, pp. 31-45.
    • (2004) Proc. of ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 18
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Springer
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Theory of cryptography. Springer, 2007, pp. 535-554.
    • (2007) Theory of Cryptography , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 19
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Springer
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. of EUROCRYPT. Springer, 2008, pp. 146-162.
    • (2008) Proc. of EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 20
    • 80051880293 scopus 로고    scopus 로고
    • Authorized private keyword search over encrypted data in cloud computing
    • M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in Proc. of ICDCS. IEEE, 2011, pp. 383-392.
    • (2011) Proc. of ICDCS. IEEE , pp. 383-392
    • Li, M.1    Yu, S.2    Cao, N.3    Lou, W.4
  • 21
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of CCS. ACM, 2006, pp. 89-98.
    • (2006) Proc. of CCS. ACM , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 22
  • 23
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy abe
    • L. Cheung and C. Newport, "Provably secure ciphertext policy abe," in Proc. of CCS. ACM, 2007, pp. 456-465.
    • (2007) Proc. of CCS. ACM , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 24
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. of ASIACCS. ACM, 2010, pp. 261-270.
    • (2010) Proc. of ASIACCS. ACM , pp. 261-270
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 25
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • Springer
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," in Theory of Cryptography. Springer, 2009, pp. 457-473.
    • (2009) Theory of Cryptography , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 28
    • 84904442547 scopus 로고    scopus 로고
    • Pairing-based cryptography libray
    • "Pairing-based cryptography libray." [Online]. Available: http://crypto.stanford.edu/pbc/
  • 29
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Springer
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," in Proc. of CRYPTO. Springer, 2001, pp. 213-229.
    • (2001) Proc. of CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.