메뉴 건너뛰기




Volumn 25, Issue 11, 2014, Pages 3025-3035

Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking

Author keywords

Cloud computing; multi keyword search; privacy preserving search; similarity based ranking; verifiable search

Indexed keywords

MULTI KEYWORDS; PRIVACY PRESERVING; SIMILARITY-BASED RANKING; TEXT SEARCH; VERIFIABLE SEARCH;

EID: 84908108453     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.282     Document Type: Article
Times cited : (219)

References (36)
  • 1
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, and H. Li, "Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking," in Proc. ACM ASIACCS, 2013, pp. 71-82.
    • (2013) Proc. ACM ASIACCS , pp. 71-82
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 6
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • Jan.
    • M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, "Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 7
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu,C.Wang, K. Ren, andW. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 9
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug.
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling Secure and Efficient Ranked Keyword Search Over Outsourced Cloud Data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 11
    • 70349110963 scopus 로고    scopus 로고
    • Zerber+r: Top-k retrieval from a confidential index
    • S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k Retrieval from a Confidential Index," in Proc. EDBT, 2009, pp. 439-449.
    • (2009) Proc. EDBT , pp. 439-449
    • Zerr, S.1    Olmedilla, D.2    Nejdl, W.3    Siberski, W.4
  • 13
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B.R. Waters, "Secure Conjunctive Keyword Search Over Encrypted Data," in Proc. ACNS, 2004, pp. 31-45.
    • (2004) Proc. ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.R.3
  • 14
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, Subset, and Range Queries on Encrypted Data," in Proc. TCC, 2007, pp. 535-554.
    • (2007) Proc. TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 15
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. Hwang and P. Lee, "Public Key Encryption with Conjunctive Keyword Search and its Extension to a Multi-User System," in Proc. Pairing, 2007, pp. 2-22.
    • (2007) Proc. Pairing , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 16
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," in Proc. IEEE S P, 2000, pp. 44-55.
    • (2000) Proc. IEEE S P , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 17
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • [Online]. Available
    • E.-J. Goh, "Secure Indexes," in Cryptology ePrint Archive 2003. [Online]. Available: http://eprint.iacr.org/2003/216.
    • (2003) Cryptology EPrint Archive
    • Goh, E.-J.1
  • 18
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," in Proc. ACNS, 2005, pp. 391-421.
    • (2005) Proc. ACNS , pp. 391-421
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 19
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," in Proc. ACM CCS, 2006, pp. 79-88.
    • (2006) Proc. ACM CCS , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 21
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang,M. Li, K. Ren, andW. Lou, "Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data," in Proc. IEEE INFOCOM, 2011, pp. 829-837.
    • (2011) Proc. IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 22
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B.Waters, "Predicate Privacy in Encryption Systems," in Proc. TCC, 2009, pp. 457-473.
    • (2009) Proc. TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 23
    • 84925827178 scopus 로고    scopus 로고
    • Privacy-preserving logarithmic-time search on encrypted data in cloud
    • Y. Lu, "Privacy-Preserving Logarithmic-Time Search on Encrypted Data In Cloud," in Proc. NDSS, 2012, pp. 1-17.
    • (2012) Proc. NDSS , pp. 1-17
    • Lu, Y.1
  • 24
    • 76849085704 scopus 로고    scopus 로고
    • Privacy-preserving similarity-based text retrieval
    • Feb.
    • H. Pang, J. Shen, and R. Krishnan, "Privacy-Preserving Similarity-Based Text Retrieval," ACM Trans. Internet Technol., vol. 10, no. 1, p. 4, Feb. 2010.
    • (2010) ACM Trans. Internet Technol. , vol.10 , Issue.1 , pp. 4
    • Pang, H.1    Shen, J.2    Krishnan, R.3
  • 25
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic Authenticated Index Structures for Outsourced Databases," in Proc. SIGMOD, 2013, pp. 121-132.
    • (2013) Proc. SIGMOD , pp. 121-132
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 26
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • H. Pang and K.-L. Tan, "Authenticating Query Results in Edge Computing," in Proc. ICDE, 2004, pp. 560-571.
    • (2004) Proc. ICDE , pp. 560-571
    • Pang, H.1    Tan, K.-L.2
  • 27
    • 76849102606 scopus 로고    scopus 로고
    • Authenticating the query results of text search engines
    • Aug.
    • H. Pang and K.Mouratidis, "Authenticating the Query Results of Text Search Engines," Proc. VLDB Endowment, vol. 1, no. 1, pp. 126-137, Aug. 2008.
    • (2008) Proc. VLDB Endowment , vol.1 , Issue.1 , pp. 126-137
    • Pang, H.1    Mouratidis, K.2
  • 28
    • 54249111543 scopus 로고    scopus 로고
    • Extending fagin's algorithm for more users based on multidimensional B-tree
    • M. Ondreicka and J. Pokorný , "Extending Fagin's Algorithm for More Users Based on Multidimensional B-Tree," in Proc. ADBIS, 2008, pp. 199-214.
    • (2008) Proc. ADBIS , pp. 199-214
    • Ondreicka, M.1    Pokorný, J.2
  • 29
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • Nov.
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private Information Retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, Nov. 1998.
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 30
    • 0020277962 scopus 로고
    • Multidimensional b-trees for associative searching in database systems
    • P. Scheuermann and M. Ouksel, "Multidimensional B-Trees for Associative Searching in Database Systems," Inf. Syst., vol. 7, no. 2, pp. 123-137, 1982.
    • (1982) Inf. Syst. , vol.7 , Issue.2 , pp. 123-137
    • Scheuermann, P.1    Ouksel, M.2
  • 31
    • 70849131456 scopus 로고    scopus 로고
    • Secure KNN computation on encrypted databases
    • W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, "Secure KNN Computation on Encrypted Databases," in Proc. SIGMOD, 2009, pp. 139-152.
    • (2009) Proc. SIGMOD , pp. 139-152
    • Wong, W.K.1    Cheung, D.W.2    Kao, B.3    Mamoulis, N.4
  • 32
    • 84881354487 scopus 로고    scopus 로고
    • Secure nearest neighbor revisited
    • B. Yao, F. Li, and X. Xiao, "Secure Nearest Neighbor Revisited," in Proc. ICDE, 2013, pp. 733-744.
    • (2013) Proc. ICDE , pp. 733-744
    • Yao, B.1    Li, F.2    Xiao, X.3
  • 34
    • 0018480749 scopus 로고
    • Ubiquitous B-tree
    • June
    • D. Comer, "Ubiquitous B-Tree," ACM Comput. Surveys, vol. 11, no. 2, pp. 121-137, June 1979.
    • (1979) ACM Comput. Surveys , vol.11 , Issue.2 , pp. 121-137
    • Comer, D.1
  • 35
    • 84877944290 scopus 로고    scopus 로고
    • [Online]. Available
    • Keyword and Search Engines Statistics. 2013. [Online]. Available: http://www.keyworddiscovery.com/keyword-stats.html?date= 2013-01-01.
    • (2013) Keyword and Search Engines Statistics


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.