-
1
-
-
77950347409
-
A view of cloud computing
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
-
(2010)
Commun ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Feb.
-
C. Wang, S. S. Chow, Q. Wang, K. Ren, W. Lou, "Privacy-preserving public auditing for secure cloud storage," IEEE Trans. Comput., vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
3
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Nagoya, Japan, Jan.
-
D. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Int. Symp. Security Privacy, Nagoya, Japan, Jan. 2000, pp. 44-55.
-
(2000)
Proc. IEEE Int. Symp. Security Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
4
-
-
33244488406
-
-
[Online] Available
-
E. Goh. (2003). Secure indexes [Online]. Available: http://eprint. iacr.org/
-
(2003)
Secure Indexes
-
-
Goh, E.1
-
5
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Oct.
-
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. 13th ACM Conf. Comput. Commun. Security, Oct. 2006, pp. 79-88.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
6
-
-
35048901123
-
Public key encryption with keyword search
-
Springer
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, "Public key encryption with keyword search," in Advances in Cryptology-Eurocrypt 2004, Springer, 2004, pp. 506-522.
-
(2004)
Advances in Cryptology-Eurocrypt 2004
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
7
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Jun.
-
P. Golle, J. Staddon, B. Waters, "Secure conjunctive keyword search over encrypted data," in Proc. Appl. Cryptography Netw. Security, Yellow Mountain, China, Jun. 2004, pp. 31-45.
-
(2004)
Proc. Appl. Cryptography Netw. Security, Yellow Mountain, China
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
8
-
-
33646736337
-
Achieving efficient conjunctive keyword searches over encrypted data
-
Beijing, China Dec.
-
L. Ballard, S. Kamara, F. Monrose, "Achieving efficient conjunctive keyword searches over encrypted data," in Proc. Inf. Commun. Security, Beijing, China, Dec. 2005, pp. 414-426.
-
(2005)
Proc. Inf. Commun. Security
, pp. 414-426
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
9
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Genoa, Italy, Jun.
-
C. Wang, N. Cao, J. Li, K. Ren, W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Distrib. Comput. Syst., Genoa, Italy, Jun. 2010, pp. 253-262.
-
(2010)
Proc. IEEE Distrib. Comput. Syst.
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
10
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Apr.
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 829-837.
-
(2011)
Proc. IEEE INFOCOM, Shanghai, China
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
11
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Jan.
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
12
-
-
84908108453
-
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
Nov.
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, H. Li, "Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 11, pp. 3025-3035, Nov. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.11
, pp. 3025-3035
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
13
-
-
84874053923
-
Efficient multikeyword ranked query on encrypted data in the cloud
-
Dec.
-
Z. Xu, W. Kang, R. Li, K. Yow, C. Xu, "Efficient multikeyword ranked query on encrypted data in the cloud," in Proc. IEEE 19th Int. Conf. Parallel Distrib. Syst., Singapore, Dec. 2012, pp. 244-251.
-
(2012)
Proc. IEEE 19th Int. Conf. Parallel Distrib. Syst., Singapore
, pp. 244-251
-
-
Xu, Z.1
Kang, W.2
Li, R.3
Yow, K.4
Xu, C.5
-
14
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
San Diego, CA, USA, Mar.
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1-5.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
15
-
-
80052398037
-
Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
-
Minneapolis, MN, USA, Jun.
-
M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. IEEE 31th Int. Conf. Distrib. Comput. Syst., Minneapolis, MN, USA, Jun. 2011, pp. 383-392.
-
(2011)
Proc. IEEE 31th Int. Conf. Distrib. Comput. Syst.
, pp. 383-392
-
-
Chuah, M.1
Hu, W.2
-
16
-
-
84884892085
-
Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack
-
Nov.
-
P. Xu, H. Jin, Q. Wu, W. Wang, "Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack," IEEE Trans. Comput., vol. 62, no. 11, pp. 2266-2277, Nov. 2013.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.11
, pp. 2266-2277
-
-
Xu, P.1
Jin, H.2
Wu, Q.3
Wang, W.4
-
17
-
-
84904421834
-
Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
-
Toronto, Canada, May
-
B. Wang, S. Yu, W. Lou, Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, Toronto, Canada, May 2014, pp. 2112-2120.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
18
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Aug.
-
C. Wang, N. Cao, K. Ren, W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
19
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
Orlando, FL, USA, Mar.
-
C. Wang, K. Ren, S. Yu, K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 451-459.
-
(2012)
Proc. IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
20
-
-
84907897200
-
Secure distributed keyword search in multiple clouds
-
Hong Kong, May
-
W. Zhang, Y. Lin, S. Xiao, Q. Liu, T. Zhou, "Secure distributed keyword search in multiple clouds," in Proc. IEEE/ACM 22nd Int. Conf. Quality Service, Hong Kong, May 2014, pp. 370-379.
-
(2014)
Proc. IEEE/ACM 22nd Int. Conf. Quality Service
, pp. 370-379
-
-
Zhang, W.1
Lin, Y.2
Xiao, S.3
Liu, Q.4
Zhou, T.5
-
21
-
-
84904444112
-
Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud
-
Toronto, Canada, May
-
W. Sun, S. Yu, W. Lou, Y. T. Hou, H. Li, "Protecting your right: Attribute-based keyword search with fine-grained ownerenforced search authorization in the cloud," in Proc. IEEE INFOCOM, Toronto, Canada, May 2014, pp. 226-234.
-
(2014)
Proc. IEEE INFOCOM
, pp. 226-234
-
-
Sun, W.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
Li, H.5
-
22
-
-
84904410658
-
Vabks: Verifiable attributebased keyword search over outsourced encrypted data
-
Toronto, Canada, May
-
Q. Zheng, S. Xu, G. Ateniese, "Vabks: Verifiable attributebased keyword search over outsourced encrypted data," in Proc. IEEE INFOCOM, Toronto, Canada, May 2014, pp. 522-530.
-
(2014)
Proc. IEEE INFOCOM
, pp. 522-530
-
-
Zheng, Q.1
Xu, S.2
Ateniese, G.3
-
23
-
-
84883112893
-
Privacy preserving cloud data access with multi-authorities
-
Turin, Italy, Apr.
-
T. Jung, X. Y. Li, Z. Wan, M. Wan, "Privacy preserving cloud data access with multi-authorities," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 2625-2633.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2625-2633
-
-
Jung, T.1
Li, X.Y.2
Wan, Z.3
Wan, M.4
-
24
-
-
84861623252
-
Efficient information retrieval for ranked queries in cost-effective cloud environments
-
Q. Liu, C. C. Tan, J. Wu, G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. IEEE INFOCOM, 2012, pp. 2581-2585.
-
(2012)
Proc. IEEE INFOCOM
, pp. 2581-2585
-
-
Liu, Q.1
Tan, C.C.2
Wu, J.3
Wang, G.4
-
25
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich,M. Sudan,"Private information retrieval," J. ACM, vol. 45, no. 6, pp. 965-981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
26
-
-
0003756969
-
-
San Francisco, CA, USA: Morgan Kaufmann
-
I. H. Witten, A. Moffat, T. C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images. San Francisco, CA, USA: Morgan Kaufmann, 1999.
-
(1999)
Managing Gigabytes: Compressing and Indexing Documents and Images
-
-
Witten, I.H.1
Moffat, A.2
Bell, T.C.3
-
27
-
-
84912129071
-
Secure ranked multi-keyword search for multiple data owners in cloud computing
-
Jun.
-
W. Zhang, S. Xiao, Y. Lin, T. Zhou, S. Zhou, "Secure ranked multi-keyword search for multiple data owners in cloud computing," in Proc. 44th Annu. IEEE/IFIP Int. Conf. Dependable Syst. Netw, Jun. 2014, pp. 276-286.
-
(2014)
Proc. 44th Annu IEEE/IFIP Int. Conf. Dependable Syst. Netw
, pp. 276-286
-
-
Zhang, W.1
Xiao, S.2
Lin, Y.3
Zhou, T.4
Zhou, S.5
-
28
-
-
84963951818
-
-
IETF. Request for comments database [Online]. Available
-
IETF. Request for comments database [Online]. Available: http://www.ietf.org/rfc.html, 2013.
-
(2013)
-
-
-
29
-
-
84922774574
-
-
H. Systems [Online] Available
-
H. Systems. Hermetic word frequency counter [Online]. Available: http://www.hermetic.ch/wfc/wfc.htm, 2013.
-
(2013)
Hermetic Word Frequency Counter
-
-
-
30
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
31
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
Hangzhou, China, May
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. IEEE 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security, Hangzhou, China, May 2013, pp. 71-81.
-
(2013)
Proc. IEEE 8th ACM SIGSAC Symp. Inf., Comput. Commun. Security
, pp. 71-81
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
32
-
-
84883281346
-
Improving security and efficiency in attribute-based data sharing
-
Oct.
-
J. Hur, "Improving security and efficiency in attribute-based data sharing," IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271-2282, Oct. 2013.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.10
, pp. 2271-2282
-
-
Hur, J.1
-
33
-
-
3142716056
-
Order preserving encryption for numeric data
-
Paris, France, Jun.
-
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order preserving encryption for numeric data," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Paris, France, Jun. 2004, pp. 563-574.
-
(2004)
Proc ACM SIGMOD Int. Conf. Manage. Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
34
-
-
80052002672
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
Aug.
-
A. Boldyreva, N. Chenette, A. O'Neill, "Order-preserving encryption revisited: Improved security analysis and alternative solutions," in Proc. 31st Annu. Conf. Adv. Cryptol., Aug. 2011, pp. 578-595.
-
(2011)
Proc. 31st Annu. Conf. Adv. Cryptol
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
35
-
-
84883113562
-
A digital watermarking approach to secure and precise range query processing in sensor networks
-
Turin, Italy, Apr.
-
Y. Yi, R. Li, F. Chen, A. X. Liu, Y. Lin, "A digital watermarking approach to secure and precise range query processing in sensor networks," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 1950-1958.
-
(2013)
Proc. IEEE INFOCOM
, pp. 1950-1958
-
-
Yi, Y.1
Li, R.2
Chen, F.3
Liu, A.X.4
Lin, Y.5
-
36
-
-
84881262361
-
An ideal-security protocol for order-preserving encoding
-
R. A. Popa, F. H. Li, N. Zeldovich, "An ideal-security protocol for order-preserving encoding," in Proc. IEEE Symp. Security Privacy, 2013, pp. 463-477.
-
(2013)
Proc. IEEE Symp. Security Privacy
, pp. 463-477
-
-
Popa, R.A.1
Li, F.H.2
Zeldovich, N.3
|