메뉴 건너뛰기




Volumn 3, Issue 1, 2015, Pages 127-139

Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage

Author keywords

Access pattern; Blind storage; Cloud computing; Multikeyword ranked search; Searchable encryption

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DIGITAL STORAGE; EFFICIENCY; MOBILE CLOUD COMPUTING; NEAREST NEIGHBOR SEARCH; SEARCH ENGINES;

EID: 84924804821     PISSN: None     EISSN: 21686750     Source Type: Journal    
DOI: 10.1109/TETC.2014.2371239     Document Type: Article
Times cited : (179)

References (29)
  • 1
    • 84862563533 scopus 로고    scopus 로고
    • An SMDP-based service model for interdomain resource allocation in mobile cloud networks
    • Jun.
    • H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, "An SMDP-based service model for interdomain resource allocation in mobile cloud networks, " IEEE Trans. Veh. Technol., vol. 61, no. 5, pp. 2222-2232, Jun. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.5 , pp. 2222-2232
    • Liang, H.1    Cai, L.X.2    Huang, D.3    Shen, X.4    Peng, D.5
  • 2
    • 84865699114 scopus 로고    scopus 로고
    • A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks
    • Oct.
    • M. M. E. A. Mahmoud and X. Shen, "A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 10, pp. 1805-1818, Oct. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.10 , pp. 1805-1818
    • Mahmoud, M.M.E.A.1    Shen, X.2
  • 3
    • 84896486238 scopus 로고    scopus 로고
    • Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation
    • Mar.
    • Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, "Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation, " IEEE J. Biomed. Health Inform., vol. 18, no. 2, pp. 430-439, Mar. 2014.
    • (2014) IEEE J. Biomed. Health Inform. , vol.18 , Issue.2 , pp. 430-439
    • Shen, Q.1    Liang, X.2    Shen, X.3    Lin, X.4    Luo, H.Y.5
  • 4
    • 84888322916 scopus 로고    scopus 로고
    • A survey of mobile cloud computing: Architecture, applications, and approaches
    • Dec.
    • H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: Architecture, applications, and approaches, " Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587-1611, Dec. 2013.
    • (2013) Wireless Commun. Mobile Comput. , vol.13 , Issue.18 , pp. 1587-1611
    • Dinh, H.T.1    Lee, C.2    Niyato, D.3    Wang, P.4
  • 5
    • 71749113079 scopus 로고    scopus 로고
    • Identity-based authentication for cloud computing
    • Berlin, Germany: Springer-Verlag
    • H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing, " in Cloud Computing. Berlin, Germany: Springer-Verlag, 2009, pp. 157-166.
    • (2009) Cloud Computing , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 6
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun, et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, " in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur, 2013, pp. 71-82.
    • (2013) Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur , pp. 71-82
    • Sun, W.1
  • 7
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preservingmulti-keyword fuzzy search over encrypted data in the cloud
    • B. Wang, S. Yu, W. Lou, and Y T. Hou, "Privacy-preservingmulti-keyword fuzzy search over encrypted data in the cloud, " in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112-2120.
    • (2014) Proc. IEEE INFOCOM, Apr./May , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 8
    • 85173019558 scopus 로고    scopus 로고
    • Practical dynamic searchable encryption with small leakage
    • Feb.
    • E. Stefanov, C. Papamanthou, and E. Shi, "Practical dynamic searchable encryption with small leakage, " in Proc. NDSS, Feb. 2014.
    • (2014) Proc. NDSS
    • Stefanov, E.1    Papamanthou, C.2    Shi, E.3
  • 9
    • 84928687796 scopus 로고    scopus 로고
    • Secure dynamic searchable symmetric encryption with constant document update cost
    • Y Yang, H. Li, W. Liu, H. Yang, and M. Wen, "Secure dynamic searchable symmetric encryption with constant document update cost, " in Proc. GLOBECOM, Anaheim, CA, USA, 2014.
    • (2014) Proc. GLOBECOM, Anaheim, CA, USA
    • Yang, Y.1    Li, H.2    Liu, W.3    Yang, H.4    Wen, M.5
  • 10
    • 84884472579 scopus 로고    scopus 로고
    • Highly-scalable searchable symmetric encryption with support for Boolean queries
    • D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries, " in Proc. CRYPTO, 2013, pp. 353-373.
    • (2013) Proc. CRYPTO , pp. 353-373
    • Cash, D.1    Jarecki, S.2    Jutla, C.3    Krawczyk, H.4    Rosu, M.-C.5    Steiner, M.6
  • 11
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Jan.
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 14
    • 76849085704 scopus 로고    scopus 로고
    • Privacy-preserving similarity-based text retrieval
    • H. Pang, J. Shen, and R. Krishnan, "Privacy-preserving similarity-based text retrieval, " ACM Trans. Internet Technol., vol. 10, no. 1, p. 4, 2010.
    • (2010) ACM Trans. Internet Technol. , vol.10 , Issue.1 , pp. 4
    • Pang, H.1    Shen, J.2    Krishnan, R.3
  • 15
    • 84897586040 scopus 로고    scopus 로고
    • Toward secure multikeyword top-k retrieval over encrypted cloud data
    • Jul./Aug.
    • J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, "Toward secure multikeyword top-k retrieval over encrypted cloud data, " IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 239-250, Jul./Aug. 2013.
    • (2013) IEEE Trans. Dependable Secure Comput. , vol.10 , Issue.4 , pp. 239-250
    • Yu, J.1    Lu, P.2    Zhu, Y.3    Xue, G.4    Li, M.5
  • 16
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • Berlin, Germany: Springer-Verlag
    • A. Lewko and B. Waters, "Decentralizing attribute-based encryption, " in Proc. EUROCRYPT. Berlin, Germany: Springer-Verlag, 2011, pp. 568-588.
    • (2011) Proc. EUROCRYPT , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 17
    • 85067714736 scopus 로고    scopus 로고
    • NSF Research Awards Abstracts 1990-2003. [Online] accessed 2004
    • NSF Research Awards Abstracts 1990-2003. [Online]. Available: http://kdd.ics.uci.edu/databases/nsfabs/nsfawards.html, accessed 2004.
  • 19
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Proc. TCC, 2007, pp. 535-554.
    • (2007) Proc. TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 20
    • 78649325305 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • Jan.
    • B. Zhang and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search, " J. Netw. Comput. Appl., vol. 34, no. 1, pp. 262-267, Jan. 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 262-267
    • Zhang, B.1    Zhang, F.2
  • 21
    • 84861623252 scopus 로고    scopus 로고
    • Efficient information retrieval for ranked queries in cost-effective cloud environments
    • Q. Liu, C. C. Tan, J. Wu, and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments, " in Proc. IEEE INFOCOM, Mar. 2012, pp. 2581-2585.
    • (2012) Proc. IEEE INFOCOM, Mar. , pp. 2581-2585
    • Liu, Q.1    Tan, C.C.2    Wu, J.3    Wang, G.4
  • 22
    • 84904444112 scopus 로고    scopus 로고
    • Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
    • W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, " in Proc. IEEE INFOCOM, Apr./May 2014, pp. 226-234.
    • (2014) Proc. IEEE INFOCOM, Apr./May , pp. 226-234
    • Sun, W.1    Yu, S.2    Lou, W.3    Hou, Y.T.4    Li, H.5
  • 23
    • 84904410658 scopus 로고    scopus 로고
    • VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
    • Q. Zheng, S. Xu, and G. Ateniese, "VABKS: Verifiable attribute-based keyword search over outsourced encrypted data, " in Proc. IEEE INFOCOM, Apr. 2014, pp. 522-530.
    • (2014) Proc. IEEE INFOCOM, Apr. , pp. 522-530
    • Zheng, Q.1    Xu, S.2    Ateniese, G.3
  • 26
    • 85178119595 scopus 로고    scopus 로고
    • Dynamic searchable encryption in very-large databases: Data structures and implementation
    • Feb.
    • D. Cash et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation, " in Proc. NDSS, Feb. 2014.
    • (2014) Proc. NDSS
    • Cash, D.1
  • 27
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug.
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.