메뉴 건너뛰기




Volumn 65, Issue 5, 2016, Pages 1566-1577

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Author keywords

Cloud computing; multiple owners; ranked keyword search

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CLOUD COMPUTING; CRYPTOGRAPHY; DATA PRIVACY;

EID: 84963939892     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2015.2448099     Document Type: Article
Times cited : (160)

References (37)
  • 2
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Feb.
    • C. Wang, S. S. Chow, Q. Wang, K. Ren, W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 3
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • Nagoya, Japan, Jan.
    • D. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Int. Symp. Security Privacy, Nagoya, Japan, Jan. 2000, pp. 44-55.
    • (2000) Proc. IEEE Int. Symp. Security Privacy , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 4
    • 33244488406 scopus 로고    scopus 로고
    • [Online] Available
    • E. Goh. (2003). Secure indexes [Online]. Available: http://eprint. iacr.org/
    • (2003) Secure Indexes
    • Goh, E.1
  • 8
    • 33646736337 scopus 로고    scopus 로고
    • Achieving efficient conjunctive keyword searches over encrypted data
    • Beijing, China Dec.
    • L. Ballard, S. Kamara, F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. Inf. Commun. Security, Beijing, China, Dec. 2005, pp. 414-426.
    • (2005) Proc. Inf. Commun. Security , pp. 414-426
    • Ballard, L.1    Kamara, S.2    Monrose, F.3
  • 9
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • Genoa, Italy, Jun.
    • C. Wang, N. Cao, J. Li, K. Ren, W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Distrib. Comput. Syst., Genoa, Italy, Jun. 2010, pp. 253-262.
    • (2010) Proc. IEEE Distrib. Comput. Syst. , pp. 253-262
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 10
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Apr.
    • N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 829-837.
    • (2011) Proc. IEEE INFOCOM, Shanghai, China , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 11
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Jan.
    • N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 12
    • 84908108453 scopus 로고    scopus 로고
    • Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • Nov.
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 11, pp. 3025-3035, Nov. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.11 , pp. 3025-3035
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 14
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • San Diego, CA, USA, Mar.
    • J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1-5.
    • (2010) Proc. IEEE INFOCOM , pp. 1-5
    • Li, J.1    Wang, Q.2    Wang, C.3    Cao, N.4    Ren, K.5    Lou, W.6
  • 15
    • 80052398037 scopus 로고    scopus 로고
    • Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
    • Minneapolis, MN, USA, Jun.
    • M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. IEEE 31th Int. Conf. Distrib. Comput. Syst., Minneapolis, MN, USA, Jun. 2011, pp. 383-392.
    • (2011) Proc. IEEE 31th Int. Conf. Distrib. Comput. Syst. , pp. 383-392
    • Chuah, M.1    Hu, W.2
  • 16
    • 84884892085 scopus 로고    scopus 로고
    • Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
    • Nov.
    • P. Xu, H. Jin, Q. Wu, W. Wang, "Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack," IEEE Trans. Comput., vol. 62, no. 11, pp. 2266-2277, Nov. 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.11 , pp. 2266-2277
    • Xu, P.1    Jin, H.2    Wu, Q.3    Wang, W.4
  • 17
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
    • Toronto, Canada, May
    • B. Wang, S. Yu, W. Lou, Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, Toronto, Canada, May 2014, pp. 2112-2120.
    • (2014) Proc. IEEE INFOCOM , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 18
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug.
    • C. Wang, N. Cao, K. Ren, W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 19
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • Orlando, FL, USA, Mar.
    • C. Wang, K. Ren, S. Yu, K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 451-459.
    • (2012) Proc. IEEE INFOCOM , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.M.R.4
  • 21
    • 84904444112 scopus 로고    scopus 로고
    • Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud
    • Toronto, Canada, May
    • W. Sun, S. Yu, W. Lou, Y. T. Hou, H. Li, "Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud," in Proc. IEEE INFOCOM, Toronto, Canada, May 2014, pp. 226-234.
    • (2014) Proc. IEEE INFOCOM , pp. 226-234
    • Sun, W.1    Yu, S.2    Lou, W.3    Hou, Y.T.4    Li, H.5
  • 22
    • 84904410658 scopus 로고    scopus 로고
    • Vabks: Verifiable attributebased keyword search over outsourced encrypted data
    • Toronto, Canada, May
    • Q. Zheng, S. Xu, G. Ateniese, "Vabks: Verifiable attributebased keyword search over outsourced encrypted data," in Proc. IEEE INFOCOM, Toronto, Canada, May 2014, pp. 522-530.
    • (2014) Proc. IEEE INFOCOM , pp. 522-530
    • Zheng, Q.1    Xu, S.2    Ateniese, G.3
  • 23
    • 84883112893 scopus 로고    scopus 로고
    • Privacy preserving cloud data access with multi-authorities
    • Turin, Italy, Apr.
    • T. Jung, X. Y. Li, Z. Wan, M. Wan, "Privacy preserving cloud data access with multi-authorities," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 2625-2633.
    • (2013) Proc. IEEE INFOCOM , pp. 2625-2633
    • Jung, T.1    Li, X.Y.2    Wan, Z.3    Wan, M.4
  • 24
    • 84861623252 scopus 로고    scopus 로고
    • Efficient information retrieval for ranked queries in cost-effective cloud environments
    • Q. Liu, C. C. Tan, J. Wu, G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. IEEE INFOCOM, 2012, pp. 2581-2585.
    • (2012) Proc. IEEE INFOCOM , pp. 2581-2585
    • Liu, Q.1    Tan, C.C.2    Wu, J.3    Wang, G.4
  • 25
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • B. Chor, E. Kushilevitz, O. Goldreich,M. Sudan,"Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 28
    • 84963951818 scopus 로고    scopus 로고
    • IETF. Request for comments database [Online]. Available
    • IETF. Request for comments database [Online]. Available: http://www.ietf.org/rfc.html, 2013.
    • (2013)
  • 29
    • 84922774574 scopus 로고    scopus 로고
    • H. Systems [Online] Available
    • H. Systems. Hermetic word frequency counter [Online]. Available: http://www.hermetic.ch/wfc/wfc.htm, 2013.
    • (2013) Hermetic Word Frequency Counter
  • 30
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 32
    • 84883281346 scopus 로고    scopus 로고
    • Improving security and efficiency in attribute-based data sharing
    • Oct.
    • J. Hur, "Improving security and efficiency in attribute-based data sharing," IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271-2282, Oct. 2013.
    • (2013) IEEE Trans. Knowl. Data Eng. , vol.25 , Issue.10 , pp. 2271-2282
    • Hur, J.1
  • 34
    • 80052002672 scopus 로고    scopus 로고
    • Order-preserving encryption revisited: Improved security analysis and alternative solutions
    • Aug.
    • A. Boldyreva, N. Chenette, A. O'Neill, "Order-preserving encryption revisited: Improved security analysis and alternative solutions," in Proc. 31st Annu. Conf. Adv. Cryptol., Aug. 2011, pp. 578-595.
    • (2011) Proc. 31st Annu. Conf. Adv. Cryptol , pp. 578-595
    • Boldyreva, A.1    Chenette, N.2    O'Neill, A.3
  • 35
    • 84883113562 scopus 로고    scopus 로고
    • A digital watermarking approach to secure and precise range query processing in sensor networks
    • Turin, Italy, Apr.
    • Y. Yi, R. Li, F. Chen, A. X. Liu, Y. Lin, "A digital watermarking approach to secure and precise range query processing in sensor networks," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 1950-1958.
    • (2013) Proc. IEEE INFOCOM , pp. 1950-1958
    • Yi, Y.1    Li, R.2    Chen, F.3    Liu, A.X.4    Lin, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.