메뉴 건너뛰기




Volumn , Issue , 2014, Pages 111-122

Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index

Author keywords

Encrypted cloud data; Multiple dimension; Range search; Tree structures

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY; DECISION TREES; DIGITAL STORAGE; EFFICIENCY; QUERY PROCESSING; SCALABILITY;

EID: 84984889346     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2590296.2590305     Document Type: Conference Paper
Times cited : (86)

References (36)
  • 4
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • M. Bellare, A. Boldyreva, and A. O'Neill. Deterministic and Efficiently Searchable Encryption. In Proc. of CRYPTO'07, pages 535-552, 2007.
    • (2007) Proc. of CRYPTO'07 , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'Neill, A.3
  • 5
    • 0016557674 scopus 로고
    • Multidimensional binary search trees used for associative searching
    • J. L. Bentley. Multidimensional Binary Search Trees Used for Associative Searching. Communications of the ACM, 18(9):509-517, 1975.
    • (1975) Communications of the ACM , vol.18 , Issue.9 , pp. 509-517
    • Bentley, J.L.1
  • 6
    • 0018480594 scopus 로고
    • Decomposable searching problems
    • J. L. Bentley. Decomposable Searching Problems. Information Processing Letters, 8(5):201-244, 1979.
    • (1979) Information Processing Letters , vol.8 , Issue.5 , pp. 201-244
    • Bentley, J.L.1
  • 8
    • 84869405506 scopus 로고    scopus 로고
    • Functional encryption: A new vision for public key cryptography
    • D. Boneh, A. Sahai, and B. Waters. Functional Encryption: A New Vision for Public Key Cryptography. Communications of the ACM, 55(11):56-64, 2012.
    • (2012) Communications of the ACM , vol.55 , Issue.11 , pp. 56-64
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 9
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. In Proc. of TCC'07, pages 535-554, 2007.
    • (2007) Proc. of TCC'07 , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 10
    • 33749573228 scopus 로고    scopus 로고
    • Anonymous hierarchical identity-based encryption (without random oracles)
    • X. Boyen and B. Waters. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In Proc. of CRYPTO'06, pages 290-307, 2006.
    • (2006) Proc. of CRYPTO'06 , pp. 290-307
    • Boyen, X.1    Waters, B.2
  • 11
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. In Proc. of IEEE INFOCOM'11, pages 829-837, 2011.
    • (2011) Proc. of IEEE INFOCOM'11 , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 13
  • 14
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher. Privacy Preserving Keyword Searches on Remote Encrypted Data. In Proc. of ACNS'05, pages 442-455, 2005.
    • (2005) Proc. of ACNS'05 , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 15
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. In Proc. of ACM CCS'06, pages 79-88, 2006.
    • (2006) Proc. of ACM CCS'06 , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 16
    • 33745120364 scopus 로고    scopus 로고
    • Secure conjunctive keyword search over encrypted data
    • P. Golle, J. Staddon, and B. Waters. Secure Conjunctive Keyword Search over Encrypted Data. In Proc. of ACNS'04, pages 31-45, 2004.
    • (2004) Proc. of ACNS'04 , pp. 31-45
    • Golle, P.1    Staddon, J.2    Waters, B.3
  • 17
    • 0021615874 scopus 로고
    • R-Trees A dynamic index structure for spatial searching
    • A. Guttman. R-Trees: A Dynamic Index Structure for Spatial Searching. In Proc. of ACM SIGMOD'84, pages 47-57, 1984.
    • (1984) Proc. of ACM SIGMOD'84 , pp. 47-57
    • Guttman, A.1
  • 19
    • 84883285558 scopus 로고    scopus 로고
    • Parallel and dynamic searchable symmetric encryption
    • S. Kamara and C. Papamanthou. Parallel and Dynamic Searchable Symmetric Encryption. In Proc. of FC, pages 258-274, 2013.
    • (2013) Proc. of FC , pp. 258-274
    • Kamara, S.1    Papamanthou, C.2
  • 22
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • J. Katz, A. Sahai, and B. Waters. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In Proc. of EUROCRYPT'08, pages 146-162, 2008.
    • (2008) Proc. of EUROCRYPT'08 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 24
    • 80051880293 scopus 로고    scopus 로고
    • Authorized private keyword search over encrypted data in cloud computing
    • M. Li, S. Yu, N. Cao, and W. Lou. Authorized Private Keyword Search over Encrypted Data in Cloud Computing. In Proc. of IEEE ICDCS'11, pages 383-392, 2011.
    • (2011) Proc. of IEEE ICDCS'11 , pp. 383-392
    • Li, M.1    Yu, S.2    Cao, N.3    Lou, W.4
  • 25
    • 84925827178 scopus 로고    scopus 로고
    • Privacy-preserving logarithmic-time search on encrypted data in cloud
    • Y. Lu. Privacy-Preserving Logarithmic-time Search on Encrypted Data in Cloud. In Proc. of NDSS'12, 2012.
    • (2012) Proc. of NDSS'12
    • Lu, Y.1
  • 26
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • T. Okamoto and K. Takashima. Hierarchical Predicate Encryption for Inner-Products. In Proc. of ASIACRYPT'09, pages 214-231, 2009.
    • (2009) Proc. of ASIACRYPT'09 , pp. 214-231
    • Okamoto, T.1    Takashima, K.2
  • 27
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • E. Shen, E. Shi, and B. Waters. Predicate Privacy in Encryption Systems. In Proc. of TCC'09, pages 457-473, 2009.
    • (2009) Proc. of TCC'09 , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 29
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proc. of IEEE S&P'00, pages 44-55, 2000.
    • (2000) Proc. of IEEE S&P'00 , pp. 44-55
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 30
    • 85173019558 scopus 로고    scopus 로고
    • Practical dynamic searchable encryption with small leakage
    • E. Stefanov, C. Papamanthou, and E. Shi. Practical Dynamic Searchable Encryption with Small Leakage. In Proc. of NDSS'14, 2014.
    • (2014) Proc. of NDSS'14
    • Stefanov, E.1    Papamanthou, C.2    Shi, E.3
  • 32
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li. Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking. In Proc. of ACM AISACCS'13, pages 71-82, 2013.
    • (2013) Proc. of ACM AISACCS'13 , pp. 71-82
    • Sun, W.1    Wang, B.2    Cao, N.3    Li, M.4    Lou, W.5    Hou, Y.T.6    Li, H.7
  • 33
    • 77955905009 scopus 로고    scopus 로고
    • Secure ranked keyword search over encrypted cloud data
    • C. Wang, N. Cao, J. Li, K. Ren, and W. Lou. Secure Ranked Keyword Search over Encrypted Cloud Data. In Proc. of ICDCS'10, pages 253-262, 2010.
    • (2010) Proc. of ICDCS'10 , pp. 253-262
    • Wang, C.1    Cao, N.2    Li, J.3    Ren, K.4    Lou, W.5
  • 34
    • 84881329100 scopus 로고    scopus 로고
    • Secure and efficient range queries on outsourced databases using r-trees
    • P. Wang and C. V. Ravishankar. Secure and Efficient Range Queries on Outsourced Databases Using R-trees. In Proc. of IEEE ICDE'13, pages 314-325, 2013.
    • (2013) Proc. of IEEE ICDE'13 , pp. 314-325
    • Wang, P.1    Ravishankar, C.V.2
  • 35
    • 33750247597 scopus 로고    scopus 로고
    • Privacy-preserving queries on encrypted data
    • Z. Yang, S. Zhong, and R. N. Wright. Privacy-Preserving Queries on Encrypted Data. In Proc. of ESORICS'06, pages 479-495, 2006.
    • (2006) Proc. of ESORICS'06 , pp. 479-495
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 36
    • 79960266628 scopus 로고    scopus 로고
    • GeoEnc: Geometric are based keys and policies in functional encrytion systems
    • M. Zhang and T. Takagi. GeoEnc: geometric are based keys and policies in functional encrytion systems. In Proc. of ACISP'11, pages 241-258, 2011.
    • (2011) Proc. of ACISP'11 , pp. 241-258
    • Zhang, M.1    Takagi, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.