메뉴 건너뛰기




Volumn , Issue , 2014, Pages 775-780

Secure dynamic searchable symmetric encryption with constant document update cost

Author keywords

Cloud computing; Dynamic update; Multi keyword; Searchable encryption

Indexed keywords

CLOUD SECURITY; CLOUD STORAGE; DATA PRIVACY; NEAREST NEIGHBOR SEARCH; SEARCH ENGINES;

EID: 84928687796     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2014.7036902     Document Type: Conference Paper
Times cited : (40)

References (17)
  • 1
    • 71749113079 scopus 로고    scopus 로고
    • Identity-based authentication for cloud computing
    • Springer
    • H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in Cloud computing. Springer, 2009, pp. 157-166
    • (2009) Cloud Computing , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 3
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, 2012
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 4
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proceedings of ACM ASIACCS, 2013, pp. 71-82
    • (2013) Proceedings of ACM ASIACCS , pp. 71-82
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 9
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-preserving access of outsourced data via oblivious ram simulation
    • Springer
    • M. T. Goodrich and M. Mitzenmacher, "Privacy-preserving access of outsourced data via oblivious ram simulation," in Automata, Languages and Programming. Springer, 2011, pp. 576-587
    • (2011) Automata, Languages and Programming , pp. 576-587
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 10
    • 84883411598 scopus 로고    scopus 로고
    • Dynamic proofs of retrievability via oblivious ram
    • Springer
    • D. Cash, A. Küpc ü, and D. Wichs, "Dynamic proofs of retrievability via oblivious ram," in Advances in Cryptology-EUROCRYPT. Springer, 2013, pp. 279-295
    • (2013) Advances in Cryptology-EUROCRYPT , pp. 279-295
    • Cash, D.1    Küpcü, A.2    Wichs, D.3
  • 11
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proceedings of IEEE INFOCOM, 2011, pp. 829-837
    • (2011) Proceedings of IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 14
    • 0002848777 scopus 로고    scopus 로고
    • Exploring the similarity space
    • J. Zobel and A. Moffat, "Exploring the similarity space," in ACM SIGIR Forum, vol. 32, no. 1, 1998, pp. 18-34
    • (1998) ACM SIGIR Forum , vol.32 , Issue.1 , pp. 18-34
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.