메뉴 건너뛰기




Volumn 11, Issue 12, 2016, Pages 2706-2716

Toward Efficient Multi-Keyword Fuzzy Search over Encrypted Outsourced Data with Accuracy Improvement

Author keywords

fuzzy search; multi keyword search; Outsourcing security; privacy preserving; searchable encryption

Indexed keywords

ALUMINUM; DATA PRIVACY; NATURAL LANGUAGE PROCESSING SYSTEMS; SEARCH ENGINES;

EID: 84991088919     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2596138     Document Type: Article
Times cited : (513)

References (32)
  • 1
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
    • Apr./May
    • B. Wang, S. Yu, W. Lou, Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112-2120.
    • (2014) Proc. IEEE INFOCOM , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 2
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Apr.
    • N. Cao, C. Wang, M. Li, K. Ren, W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE INFOCOM, Apr. 2011, pp. 829-837.
    • (2011) Proc. IEEE INFOCOM , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 3
    • 84877939257 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
    • W. Sun et al., "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. 8th ASIACCS, 2013, pp. 71-82.
    • (2013) Proc. 8th ASIACCS , pp. 71-82
    • Sun, W.1
  • 5
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, Q. Wang, "A secure and dynamic multikeyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016, doi: 10.1109/TPDS.2015.2401003.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 7
    • 84923796188 scopus 로고    scopus 로고
    • Smart cloud search services: Verifiable keyword-based semantic search over encrypted cloud data
    • Nov.
    • Z. Fu, J. Shu, X. Sun, N. Linge, "Smart cloud search services: Verifiable keyword-based semantic search over encrypted cloud data," IEEE Trans. Consum. Electron., vol. 60, no. 4, pp. 762-770, Nov. 2014.
    • (2014) IEEE Trans. Consum. Electron. , vol.60 , Issue.4 , pp. 762-770
    • Fu, Z.1    Shu, J.2    Sun, X.3    Linge, N.4
  • 8
    • 80052398037 scopus 로고    scopus 로고
    • Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data
    • Jun.
    • M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. 31st Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW), Jun. 2011, pp. 273-281.
    • (2011) Proc. 31st Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW) , pp. 273-281
    • Chuah, M.1    Hu, W.2
  • 9
    • 80055115224 scopus 로고    scopus 로고
    • Fuzzy keyword search on encrypted cloud storage data with small index
    • Sep.
    • C. Liu, L. Zhu, L. Li, Y. Tan, "Fuzzy keyword search on encrypted cloud storage data with small index," in Proc. ICCCIS, Sep. 2011, pp. 269-273.
    • (2011) Proc. ICCCIS , pp. 269-273
    • Liu, C.1    Zhu, L.2    Li, L.3    Tan, Y.4
  • 10
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, "Searchable symmetric encryption: Improved definitions and efficient constructions," in Proc. CCS, 2006, pp. 79-88.
    • (2006) Proc. CCS , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 11
    • 84864234736 scopus 로고    scopus 로고
    • Efficient similarity search over encrypted data
    • Washington, DC, USA, Apr.
    • M. Kuzu, M. S. Islam, M. Kantarcioglu, "Efficient similarity search over encrypted data," in Proc. 28th IEEE Int. Conf. Data Eng., Washington, DC, USA, Apr. 2012, pp. 1156-1167.
    • (2012) Proc. 28th IEEE Int. Conf. Data Eng. , pp. 1156-1167
    • Kuzu, M.1    Islam, M.S.2    Kantarcioglu, M.3
  • 12
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • Mar
    • J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-5.
    • (2010) Proc. IEEE INFOCOM , pp. 1-5
    • Li, J.1    Wang, Q.2    Wang, C.3    Cao, N.4    Ren, K.5    Lou, W.6
  • 13
    • 84937574040 scopus 로고    scopus 로고
    • Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query
    • J.Wang, X. Yu, M. Zhao, "Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query," Arabian J. Sci. Eng., vol. 40, no. 8, pp. 2375-2388, 2015.
    • (2015) Arabian J. Sci. Eng. , vol.40 , Issue.8 , pp. 2375-2388
    • Wang, J.1    Yu, X.2    Zhao, M.3
  • 15
    • 0031644241 scopus 로고    scopus 로고
    • Approximate nearest neighbors: Towards removing the curse of dimensionality
    • P. Indyk and R. Motwani, "Approximate nearest neighbors: Towards removing the curse of dimensionality," in Proc. 30th ACM Symp. Theory Comput., 1998, pp. 604-613.
    • (1998) Proc. 30th ACM Symp. Theory Comput. , pp. 604-613
    • Indyk, P.1    Motwani, R.2
  • 16
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
    • (1970) Commun ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 18
    • 4544259509 scopus 로고    scopus 로고
    • Locality-sensitive hashing scheme based on p-stable distributions
    • M. Datar, N. Immorlica, P. Indyk, V. S. Mirrokni, "Locality-sensitive hashing scheme based on p-stable distributions," in Proc. SCG, 2004, pp. 253-262.
    • (2004) Proc. SCG , pp. 253-262
    • Datar, M.1    Immorlica, N.2    Indyk, P.3    Mirrokni, V.S.4
  • 19
    • 35148868279 scopus 로고    scopus 로고
    • RFC accessed on Jul. 1 2016
    • RFC. Request for Comments, accessed on Jul. 1, 2016. [Online]. Available: http://www.ietf.org/rfc.html
    • Request for Comments
  • 20
    • 84948481845 scopus 로고
    • An algorithm for suffix stripping
    • M. F. Porter, "An algorithm for suffix stripping," Program, vol. 14, no. 3, pp. 130-137, 1980.
    • (1980) Program , vol.14 , Issue.3 , pp. 130-137
    • Porter, M.F.1
  • 21
    • 0001794236 scopus 로고
    • Development of a stemming algorithm
    • Mar./Jun.
    • J. B. Lovins, "Development of a stemming algorithm," Mech. Transl. Comput. Linguistics, vol. 11, pp. 22-31, Mar./Jun. 1968.
    • (1968) Mech. Transl. Comput. Linguistics , vol.11 , pp. 22-31
    • Lovins, J.B.1
  • 22
    • 46549088731 scopus 로고
    • Managing gigabytes: Compressing and indexing documents and images
    • Nov.
    • I. H. Witten, A. Moffat, T. C. Bell, "Managing gigabytes: Compressing and indexing documents and images," IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 2101-2102, Nov. 1995.
    • (1995) IEEE Trans. Inf. Theory , vol.41 , Issue.6 , pp. 2101-2102
    • Witten, I.H.1    Moffat, A.2    Bell, T.C.3
  • 25
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • D. X. Song, D. Wagner, A. Perrig, "Practical techniques for searches on encrypted data," in Proc. SP, 2000, pp. 44-55.
    • (2000) Proc. SP , pp. 44-55
    • Song, D.X.1    Wagner, D.2    Perrig, A.3
  • 27
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. ACNS, 2005, pp. 442-455.
    • (2005) Proc. ACNS , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 28
    • 84960539113 scopus 로고    scopus 로고
    • Verifiable auditing for outsourced database in cloud computing
    • Nov.
    • J. Wang, X. Chen, X. Huang, I. You, Y. Xiang, "Verifiable auditing for outsourced database in cloud computing," IEEE Trans. Comput., vol. 64, no. 11, pp. 3293-3303, Nov. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.11 , pp. 3293-3303
    • Wang, J.1    Chen, X.2    Huang, X.3    You, I.4    Xiang, Y.5
  • 29
    • 85043522126 scopus 로고    scopus 로고
    • Catch you if you misbehave: Ranked keyword search results verification in cloud computing
    • to be published
    • W. Zhang, Y. Lin, Q. Gu, "Catch you if you misbehave: Ranked keyword search results verification in cloud computing," IEEE Trans. Cloud Comput., to be published, doi: 10.1109/TCC.2015.2481389.
    • IEEE Trans. Cloud Comput.
    • Zhang, W.1    Lin, Y.2    Gu, Q.3
  • 30
    • 84973579525 scopus 로고    scopus 로고
    • Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
    • May/Jun.
    • H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, X. S. Shen, "Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data," IEEE Trans. Dependable Secure Comput., vol. 13, no. 3, pp. 312-325, May/Jun. 2016.
    • (2016) IEEE Trans. Dependable Secure Comput. , vol.13 , Issue.3 , pp. 312-325
    • Li, H.1    Yang, Y.2    Luan, T.H.3    Liang, X.4    Zhou, L.5    Shen, X.S.6
  • 31
    • 84954217862 scopus 로고    scopus 로고
    • Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee
    • Apr./May
    • B. Wang, W. Song, W. Lou, Y. T. Hou, "Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee," in Proc. IEEE INFOCOM, Apr./May 2015, pp. 2092-2100.
    • (2015) Proc. IEEE INFOCOM , pp. 2092-2100
    • Wang, B.1    Song, W.2    Lou, W.3    Hou, Y.T.4
  • 32
    • 84982135416 scopus 로고    scopus 로고
    • Enabling personalized search over encrypted outsourced data with efficiency improvement
    • to be published
    • Z. Fu, K. Ren, J. Shu, X. Sun, F. Huang, "Enabling personalized search over encrypted outsourced data with efficiency improvement," IEEE Trans. Parallel Distrib. Syst., to be published, doi: 10.1109/TPDS.2015.2506573.
    • IEEE Trans. Parallel Distrib. Syst.
    • Fu, Z.1    Ren, K.2    Shu, J.3    Sun, X.4    Huang, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.