메뉴 건너뛰기




Volumn 27, Issue 4, 2016, Pages 951-963

An Efficient Privacy-Preserving Ranked Keyword Search Method

Author keywords

big data; ciphertext search; Cloud computing; hierarchical clustering; multi keyword search; ranked search; security

Indexed keywords

CLOUD COMPUTING; CLUSTER ANALYSIS; CRYPTOGRAPHY; DATA PRIVACY; SEARCH ENGINES; SECURITY OF DATA; SEMANTICS;

EID: 84963538055     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2015.2425407     Document Type: Article
Times cited : (150)

References (41)
  • 1
    • 80054816611 scopus 로고    scopus 로고
    • Security analysis of authentication protocols for next-generation mobile and CE cloud services
    • 2011, Berlin, Germany
    • S. Grzonkowski, P. M. Corcoran, and T. Coughlin, "Security analysis of authentication protocols for next-generation mobile and CE cloud services," in Proc. IEEE Int. Conf. Consumer Electron., 2011, Berlin, Germany, 2011, pp. 83-87.
    • (2011) Proc. IEEE Int. Conf. Consumer Electron. , pp. 83-87
    • Grzonkowski, S.1    Corcoran, P.M.2    Coughlin, T.3
  • 2
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • Berkeley, CA
    • D. X. D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Security Priv., BERKELEY, CA, 2000, pp. 44-55.
    • (2000) Proc. IEEE Symp. Security Priv. , pp. 44-55
    • Song, D.X.D.1    Wagner, D.2    Perrig, A.3
  • 5
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Alexandria, Virginia
    • R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Security, Alexandria, Virginia, 2006, pp. 79-88.
    • (2006) Proc. 13th ACM Conf. Comput. Commun. Security , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 7
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • Amsterdam, NETHERLANDS
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. 4th Conf. Theory Cryptography, Amsterdam, NETHERLANDS, 2007, pp. 535-554.
    • (2007) Proc. 4th Conf. Theory Cryptography , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 9
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug.
    • C. Wang, N. Cao, K. Ren, and W. J. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.J.4
  • 14
    • 33646736337 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • Beijing, China
    • L. Ballard, S. Kamara, and F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. 7th Int. Conf. Inform. Commun. Security, Beijing, China, 2005, pp. 414-426.
    • (2005) Proc. 7th Int. Conf. Inform. Commun. Security , pp. 414-426
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 16
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Tokyo, Japan
    • Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," in Proc. 1st Int. Conf. Pairing-Based Cryptography, Tokyo, JAPAN, 2007, pp. 2-22.
    • (2007) Proc. 1st Int. Conf. Pairing-Based Cryptography , pp. 2-22
    • Hwang, Y.H.1    Lee, P.J.2
  • 17
    • 76849085704 scopus 로고    scopus 로고
    • Privacy-preserving similaritybased text retrieval
    • Feb.
    • H. Pang, J. Shen, and R. Krishnan, "Privacy-preserving similaritybased text retrieval," ACM Trans. Internet Technol., vol. 10, no. 1, pp. 39, Feb. 2010.
    • (2010) ACM Trans. Internet Technol. , vol.10 , Issue.1 , pp. 39
    • Pang, H.1    Shen, J.2    Krishnan, R.3
  • 18
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 829-837.
    • (2011) Proc. IEEE INFOCOM, Shanghai, China , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.J.5
  • 20
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Chicago, IL
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, "Dynamic authenticated index structures for outsourced databases," in Proc. ACM SIGMOD, Chicago, IL, 2006, pp. 121-132.
    • (2006) Proc. ACM SIGMOD , pp. 121-132
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 21
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Boston, MA
    • H. H. Pang and K. L. Tan, "Authenticating query results in edge computing," in Proc. 20th Int. Conf. Data Eng., Boston, MA, 2004, pp. 560-571.
    • (2004) Proc. 20th Int. Conf. Data Eng. , pp. 560-571
    • Pang, H.H.1    Tan, K.L.2
  • 23
    • 0009554659 scopus 로고
    • Protocols for public key cryptosystems
    • Oakland, CA
    • C. M. Ralph, "Protocols for public key cryptosystems," in Proc. IEEE Symp. Security Priv, Oakland, CA, 1980, pp. 122-122.
    • (1980) Proc. IEEE Symp. Security Priv , pp. 122
    • Ralph, C.M.1
  • 24
    • 84969346266 scopus 로고
    • A certified digital signature
    • R. C. Merkle, "A certified digital signature," in Proc. Adv. cryptol., 1990, vol. 435, pp. 218-238.
    • (1990) Proc. Adv. Cryptol. , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 25
    • 0033733822 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Apr.
    • M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 561-570, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.4 , pp. 561-570
    • Naor, M.1    Nissim, K.2
  • 26
    • 76849102606 scopus 로고    scopus 로고
    • Authenticating the query results of text search engines
    • Aug.
    • H. Pang and K. Mouratidis, "Authenticating the query results of text search engines," in Proc. VLDB Endow., vol. 1, no. 1, pp. 126-137, Aug. 2008.
    • (2008) Proc. VLDB Endow. , vol.1 , Issue.1 , pp. 126-137
    • Pang, H.1    Mouratidis, K.2
  • 28
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • San Diego, CA
    • S. C. Yu, C. Wang, K. Ren, and W. J. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. IEEE INFOCOM, San Diego, CA, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Yu, S.C.1    Wang, C.2    Ren, K.3    Lou, W.J.4
  • 30
    • 0001457509 scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • J. MacQueen, "Some methods for classification and analysis of multivariate observations," in Proc. Berkeley Symp. Math. Stat. Prob., California, 1967, p. 14.
    • (1967) Proc. Berkeley Symp. Math. Stat. Prob., California , pp. 14
    • MacQueen, J.1
  • 31
    • 27144536001 scopus 로고    scopus 로고
    • Extensions to the k-means algorithm for clustering large data sets with categorical values
    • Sep.
    • Z. X. Huang, "Extensions to the k-means algorithm for clustering large data sets with categorical values," Data Min. Knowl. Discov., vol. 2, no. 3, pp. 283-304, Sep. 1998.
    • (1998) Data Min. Knowl. Discov. , vol.2 , Issue.3 , pp. 283-304
    • Huang, Z.X.1
  • 33
    • 84888339077 scopus 로고    scopus 로고
    • Efficient Multi-keyword ranked query over encrypted data in cloud computing
    • Jan.
    • R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, "Efficient Multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014.
    • (2014) Futur. Gener. Comp. Syst. , vol.30 , pp. 179-190
    • Li, R.X.1    Xu, Z.Y.2    Kang, W.S.3    Yow, K.C.4    Xu, C.Z.5
  • 34
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • G. Craig, "Fully homomorphic encryption using ideal lattices," in Proc. 41stAnnu.ACMSymp. Theory Comput., 2009, vol. 9, pp. 169-178
    • (2009) Proc. 41stAnnu.ACMSymp. Theory Comput. , vol.9 , pp. 169-178
    • Craig, G.1
  • 36
    • 84884472579 scopus 로고    scopus 로고
    • Highly-scalable searchable symmetric encryption with support for Boolean que-ries
    • Berlin, Heidelberg
    • D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean que-ries," in Proc. Adv. Cryptol,. Berlin, Heidelberg, 2013, pp. 353-373.
    • (2013) Proc. Adv. Cryptol , pp. 353-373
    • Cash, D.1    Jarecki, S.2    Jutla, C.3    Krawczyk, H.4    Rosu, M.5    Steiner, M.6
  • 39
    • 78650834524 scopus 로고    scopus 로고
    • Structured encryption and controlled disclosure
    • M. Chase and S. Kamara, "Structured encryption and controlled disclosure," in Proc. Adv. Cryptol., 2010, pp. 577-594.
    • (2010) Proc. Adv. Cryptol. , pp. 577-594
    • Chase, M.1    Kamara, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.