메뉴 건너뛰기




Volumn 7, Issue 14, 2014, Pages 1953-1964

Fast range query processing with strong privacy protection for cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

BINARY TREES; CLOUD COMPUTING; DATA PRIVACY; TREES (MATHEMATICS);

EID: 84921064425     PISSN: None     EISSN: 21508097     Source Type: Journal    
DOI: 10.14778/2733085.2733100     Document Type: Conference Paper
Times cited : (95)

References (42)
  • 1
    • 85028495084 scopus 로고    scopus 로고
    • Amazon web services
    • Amazon web services, aws.amazon.com.
  • 2
    • 84938121453 scopus 로고    scopus 로고
    • Google app engine
    • Google app engine, code.google.com/appengine.
  • 3
    • 84938121454 scopus 로고    scopus 로고
    • Microsoft azure
    • Microsoft azure, www.microsoft.com/azure.
  • 10
    • 84881219587 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In CRYPTO, 2011.
    • (2011) CRYPTO
    • Boldyreva, A.1    Chenette, N.2    O'Neill, A.3
  • 12
    • 33751053984 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • X. Boyen and B. Waters. Anonymous hierarchical identity-based encryption (without random oracles). In CRYPTO, 2006.
    • (2006) CRYPTO
    • Boyen, X.1    Waters, B.2
  • 14
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. In IEEE INFOCOM, 2011.
    • (2011) IEEE INFOCOM
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 16
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: improved definitions and efficient constructions
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: improved definitions and efficient constructions. In ACM CCS, 2006.
    • (2006) ACM CCS
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 17
    • 81255134906 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, G. A. J., S. Kamara, and R. Ostrovsky. Searchable symmetric encryption: Improved definitions and efficient constructions. Journal of Computer Security, 19:895-934, 2011.
    • (2011) Journal of Computer Security , vol.19 , pp. 895-934
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 18
    • 18744366643 scopus 로고    scopus 로고
    • Balancing confidentiality and efficiency in untrusted relational dbmss
    • E. Damiani, S. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational dbmss. In CCS, pages 93-102, 2003.
    • (2003) CCS , pp. 93-102
    • Damiani, E.1    Vimercati, S.C.2    Jajodia, S.3    Paraboschi, S.4    Samarati, P.5
  • 19
    • 84938058496 scopus 로고    scopus 로고
    • Stanford University Technical Report
    • Eujin-Goh. Secure indexes. Stanford University Technical Report, 2004.
    • (2004) Secure indexes
    • Eu Jin, G.1
  • 21
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • May
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. Journal of ACM, 43(3):431-473, May 1996.
    • (1996) Journal of ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 23
    • 0035278163 scopus 로고    scopus 로고
    • Algorithms for packet classification
    • P. Gupta and N. McKeown. Algorithms for packet classification. IEEE Network, 15(2):24-32, 2001.
    • (2001) IEEE Network , vol.15 , Issue.2 , pp. 24-32
    • Gupta, P.1    McKeown, N.2
  • 24
    • 0036361105 scopus 로고    scopus 로고
    • Executing sql over encrypted data in the database-service-provider model
    • H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In SIGMOD, 2002.
    • (2002) SIGMOD
    • Hacigumus, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 25
    • 84861186664 scopus 로고    scopus 로고
    • Secure multidimensional range queries over outsourced data
    • June
    • B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu. Secure multidimensional range queries over outsourced data. The VLDB Journal, 21(3):333-358, June 2012.
    • (2012) The VLDB Journal , vol.21 , Issue.3 , pp. 333-358
    • Hore, B.1    Mehrotra, S.2    Canim, M.3    Kantarcioglu, M.4
  • 26
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • B. Hore, S. Mehrotra, and G. Tsudik. A privacy-preserving index for range queries. In VLDB, pages 720-731, 2004.
    • (2004) VLDB , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 28
    • 34247399538 scopus 로고    scopus 로고
    • Security issues in querying encrypted data
    • M. Kantarcioglu and C. Clifton. Security issues in querying encrypted data. In DBSec, 2005.
    • (2005) DBSec
    • Kantarcioglu, M.1    Clifton, C.2
  • 31
    • 67649645974 scopus 로고    scopus 로고
    • Efficiency and security trade-off in supporting range queries on encrypted databases
    • J. Li and E. R. Omiecinski. Efficiency and security trade-off in supporting range queries on encrypted databases. In 19th DBSec, 2005.
    • (2005) 19th DBSec
    • Li, J.1    Omiecinski, E.R.2
  • 33
    • 57549111039 scopus 로고    scopus 로고
    • Collaborative enforcement of firewall policies in virtual private networks
    • A. X. Liu and F. Chen. Collaborative enforcement of firewall policies in virtual private networks. In Proc. ACM PODC, 2008.
    • (2008) Proc. ACM PODC
    • Liu, A.X.1    Chen, F.2
  • 34
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • May
    • E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. Trans. Storage, 2(2):107-138, May 2006.
    • (2006) Trans. Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 35
    • 79958167312 scopus 로고    scopus 로고
    • Privacy preserving clustering by data transformation
    • S. R. M. Oliveira and O. R. Zaïane. Privacy preserving clustering by data transformation. JIDM, 1(1):37-52, 2010.
    • (2010) JIDM , vol.1 , Issue.1 , pp. 37-52
    • Oliveira, S.R.M.1    Zaïane, O.R.2
  • 36
    • 23944469009 scopus 로고    scopus 로고
    • Public key encryption with conjunctive field keyword search
    • D. Park, K. Kim, and P. Lee. Public key encryption with conjunctive field keyword search. In Information Security Applications, pages 73-86. 2005.
    • (2005) Information Security Applications , pp. 73-86
    • Park, D.1    Kim, K.2    Lee, P.3
  • 37
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO 84, pages 47-53, 1985.
    • (1985) CRYPTO 84 , pp. 47-53
    • Shamir, A.1
  • 39
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In IEEE S&P Symposium, 2000.
    • (2000) IEEE S&P Symposium
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 41
    • 70849131456 scopus 로고    scopus 로고
    • Secure knn computation on encrypted databases
    • July
    • W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis. Secure knn computation on encrypted databases. In SIGMOD, pages 139-152, July 2009.
    • (2009) SIGMOD , pp. 139-152
    • Wong, W.K.1    Cheung, D.W.-L.2    Kao, B.3    Mamoulis, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.