메뉴 건너뛰기




Volumn E98B, Issue 1, 2015, Pages 190-200

Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing

Author keywords

Cloud computing; Cloud security; Multi keyword ranked search; Parallel search; Searchable encryption

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; EFFICIENCY; MOBILE SECURITY; PARALLEL ARCHITECTURES; SEARCH ENGINES; VECTOR SPACES;

EID: 84922280033     PISSN: 09168516     EISSN: 17451345     Source Type: Journal    
DOI: 10.1587/transcom.E98.B.190     Document Type: Article
Times cited : (697)

References (27)
  • 1
    • 84924742125 scopus 로고    scopus 로고
    • Draft nist working definition of cloud computing
    • Online at , accessed Aug. 2010
    • P. Mell and T. Grance, "Draft nist working definition of cloud computing," Referenced on Jan. 23rd, 2010 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, accessed Aug. 2010.
    • (2010) Referenced on Jan. 23rd
    • Mell, P.1    Grance, T.2
  • 3
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol.23, no.8, pp.1467-1479, 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 4
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," Proc. S&P, pp.44-55, 2000.
    • (2000) Proc. S&P , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 5
    • 84924726716 scopus 로고    scopus 로고
    • Secure indexes
    • accessed Aug
    • E.-J. Goh, "Secure indexes," Cryptology ePrint Archive, http://eprint.iacr.org/2003/216, accessed Aug. 2013.
    • (2013) Cryptology EPrint Archive
    • Goh, E.-J.1
  • 6
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," Proc. ACNS, pp.391-421, 2005.
    • (2005) Proc. ACNS , pp. 391-421
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 7
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," Proc. ACM CCS, pp.79-88, 2006.
    • (2006) Proc. ACM CCS , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 9
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • M. Bellare, A. Boldyreva, and A. ONeill, "Deterministic and efficiently searchable encryption," Proc. CRYPTO, pp.535-552, 2007.
    • (2007) Proc. CRYPTO , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    Oneill, A.3
  • 11
    • 38049138213 scopus 로고    scopus 로고
    • Public key encryption that allows pir queries
    • D. Boneh, E. Kushilevitz, R. Ostrovsky, and W.E.S. III, "Public key encryption that allows pir queries," Proc. CRYPTO, pp.50-67, 2007.
    • (2007) Proc. CRYPTO , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3
  • 13
    • 70349110963 scopus 로고    scopus 로고
    • Zerber+r: Top-k retrieval from a confidential index
    • S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, "Zerber+r: Top-k retrieval from a confidential index," Proc. EDBT, pp.439-449, 2009.
    • (2009) Proc. EDBT , pp. 439-449
    • Zerr, S.1    Olmedilla, D.2    Nejdl, W.3    Siberski, W.4
  • 14
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," Proc. IEEE INFOCOM, pp.829-837, 2011.
    • (2011) Proc. IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 15
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT. Hou, H.L, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," Proc. ASIACCS, pp.71-82, 2013.
    • (2013) Proc. ASIACCS , pp. 71-82
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.H.L.6
  • 16
    • 84916596197 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • accessed Aug
    • S. Kamara and C. Papamanthou, "Parallel and dynamic searchable symmetric encryption," Cryptology ePrint Archive, http://eprint. iacr.org/2013/335, accessed Aug. 2013.
    • (2013) Cryptology EPrint Archive
    • Kamara, S.1    Papamanthou, C.2
  • 19
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B.Waters, "Conjunctive, subset, and range queries on encrypted data," Proc. TCC, pp.535-554, 2007.
    • (2007) Proc. TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 20
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B.R. Waters, "Secure conjunctive keyword search over encrypted data," Proc. ACNS, pp.31-45, 2004.
    • (2004) Proc. ACNS , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.R.3
  • 21
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. Hwang and P. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Pairing, pp.2-22, 2007.
    • (2007) Pairing , pp. 2-22
    • Hwang, Y.1    Lee, P.2
  • 22
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," Proc. EUROCRYPT, pp.146-162, 2008.
    • (2008) Proc. EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 23
    • 84860009960 scopus 로고    scopus 로고
    • Adaptively attribute-hiding (hierarchical) inner product encryption
    • T. Okamoto and K. Takashima, "Adaptively attribute-hiding (Hierarchical) inner product encryption," Proc. EUROCRYPT, pp.591-608, 2012.
    • (2012) Proc. EUROCRYPT , pp. 591-608
    • Okamoto, T.1    Takashima, K.2
  • 24
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters, "Predicate privacy in encryption systems," Proc. TCC, pp.457-473, 2009.
    • (2009) Proc. TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 26


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.