메뉴 건너뛰기




Volumn 27, Issue 4, 2016, Pages 1187-1198

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Author keywords

attribute based keyword search; Cloud computing; fine grained owner enforced search authorization; multi user search; verifiable search

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY; TRUSTED COMPUTING;

EID: 84963527101     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2014.2355202     Document Type: Article
Times cited : (287)

References (36)
  • 1
    • 84904444112 scopus 로고    scopus 로고
    • Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud
    • W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud," in Proc. IEEE Conf. Comput. Commun., 2014, pp. 226-234.
    • (2014) Proc. IEEE Conf. Comput. Commun. , pp. 226-234
    • Sun, W.1    Yu, S.2    Lou, W.3    Hou, Y.T.4    Li, H.5
  • 2
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE Conf. Comput. Commun., 2010, pp. 1-9.
    • (2010) Proc. IEEE Conf. Comput. Commun. , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 3
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • Jan.
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, "Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 7
    • 77649261628 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA
    • C. Gentry, "A fully homomorphic encryption scheme," Ph.D. dissertation, Dept. Comput. Sci., Stanford Univ., Stanford, CA, USA, 2009.
    • (2009) A Fully Homomorphic Encryption Scheme
    • Gentry, C.1
  • 10
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE Conf. Comput. Commun., 2011, pp. 829-837.
    • (2011) Proc. IEEE Conf. Comput. Commun. , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 12
    • 41549164259 scopus 로고    scopus 로고
    • Private query on encrypted data in multi-user settings
    • New York, NY, USA: Springer
    • F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private query on encrypted data in multi-user settings," in Information Security Practice and Experience. New York, NY, USA: Springer, 2008, pp. 71-85.
    • (2008) Information Security Practice and Experience , pp. 71-85
    • Bao, F.1    Deng, R.H.2    Ding, X.3    Yang, Y.4
  • 14
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Y. H. Hwang, and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Proc. 1st Int. Conf. Pairing, 2007, pp. 2-22.
    • (2007) Proc. 1st Int. Conf. Pairing , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 19
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. 4th Conf. Theory Cryptography, 2007, pp. 535-554.
    • (2007) Proc. 4th Conf. Theory Cryptography , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 22
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • H. Pang and K.-L. Tan, "Authenticating query results in edge computing," in Proc. 20th Int. Conf. Data Eng., 2004, pp. 560-571.
    • (2004) Proc. 20th Int. Conf. Data Eng. , pp. 560-571
    • Pang, H.1    Tan, K.-L.2
  • 23
    • 76849102606 scopus 로고    scopus 로고
    • Authenticating the query results of text search engines
    • H. Pang and K. Mouratidis, "Authenticating the query results of text search engines," Proc. VLDB Endowment, vol. 1, no. 1, pp. 126-137, 2008.
    • (2008) Proc. VLDB Endowment , vol.1 , Issue.1 , pp. 126-137
    • Pang, H.1    Mouratidis, K.2
  • 24
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug.
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 25
    • 84908108453 scopus 로고    scopus 로고
    • Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • Nov.
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 11, pp. 3025-3035, Nov. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.11 , pp. 3025-3035
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 26
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 33
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.