메뉴 건너뛰기




Volumn 65, Issue , 2016, Pages 102-110

Secure searching on cloud storage enhanced by homomorphic indexing

Author keywords

Cloud storage; Secure searching; XOR homomorphism encryption

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; INDEXING (OF INFORMATION); RANDOM ACCESS STORAGE; SECURITY OF DATA;

EID: 84992311607     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.03.013     Document Type: Article
Times cited : (42)

References (24)
  • 1
    • 85017483583 scopus 로고    scopus 로고
    • Amazon, Amazon simple storage service. URL:.
    • [1] Amazon, Amazon simple storage service. URL: http://aws.amazon.com/s3.
  • 2
    • 85017484751 scopus 로고    scopus 로고
    • Megaupload, Megaupload. URL:.
    • [2] Megaupload, Megaupload. URL: http://www.megaupload.com.
  • 3
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • in: Proc. of IEEE Symposium on Security and Privacy,.
    • [3] D. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proc. of IEEE Symposium on Security and Privacy, 2000, p. 44.
    • (2000) , pp. 44
    • Song, D.1    Wagner, D.2    Perrig, A.3
  • 4
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • in: Proc. of Proc. of EUROCRYPT 2004,
    • [4] D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Proc. of Proc. of EUROCRYPT 2004, 2004, pp. 506–522.
    • (2004) , pp. 506-522
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 5
    • 34748812366 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report 2004/051
    • [5] Chang, Y.-C., Mitzenmacher, M., Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report 2004/051., 2004 http://eprint.iacr.org/.
    • (2004)
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 6
    • 33745785145 scopus 로고    scopus 로고
    • Building secure indexes for searching efficiently on encrypted compressed data
    • Online URL:.
    • [6] E.-J. Goh, Building secure indexes for searching efficiently on encrypted compressed data, Online (2003). URL: http://eprint.iacr.org/2003/216/.
    • (2003)
    • Goh, E.-J.1
  • 8
    • 84856182117 scopus 로고    scopus 로고
    • Achieving full security in privacy-preserving data mining
    • in: Proceedings of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust,.
    • [8] M. Blanton, Achieving full security in privacy-preserving data mining, in: Proceedings of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust, 2011.
    • (2011)
    • Blanton, M.1
  • 9
    • 85017492308 scopus 로고    scopus 로고
    • Multi-keyword similarity search over encrypted cloud data, Cryptology ePrint Archive, Report 2015/137
    • URL:
    • [9] Strizhov, M., Ray, I., Multi-keyword similarity search over encrypted cloud data, Cryptology ePrint Archive, Report 2015/137., 2015 URL: https://eprint.iacr.org.
    • (2015)
    • Strizhov, M.1    Ray, I.2
  • 10
    • 84897447237 scopus 로고    scopus 로고
    • An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data
    • [10] Chen, L., Sun, X., Xia, Z., Liu, Q., An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data. Int. J. Secur. Appl., 2014.
    • (2014) Int. J. Secur. Appl.
    • Chen, L.1    Sun, X.2    Xia, Z.3    Liu, Q.4
  • 11
    • 85017485130 scopus 로고    scopus 로고
    • Sorting and searching behind the curtain
    • in: Financial Cryptography,.
    • [11] F. Baldimtsi, O. Ohrimenko, Sorting and searching behind the curtain, in: Financial Cryptography, 2015.
    • (2015)
    • Baldimtsi, F.1    Ohrimenko, O.2
  • 12
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • [12] G. Oded, O. Rafail, Software protection and simulation on oblivious rams, Vol. 43, 1996. URL: http://doi.acm.org/10.1145/233551.233553.
    • (1996) , vol.43
    • Oded, G.1    Rafail, O.2
  • 13
    • 34548706878 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • (mit Ph.D. thesis) Online. URL:
    • [13] Ostrovsky, R., Software protection and simulation on oblivious rams. (mit Ph.D. thesis), 2009 Online. URL: http://www.cs.ucla.edu/~rafail/PUBLIC/09.pdf.
    • (2009)
    • Ostrovsky, R.1
  • 14
    • 84861183066 scopus 로고    scopus 로고
    • Oblivious ram revisited
    • Online URL:.
    • [14] B. Pinkas, T. Reinman, Oblivious ram revisited, Online (2010). URL: http://eprint.iacr.org/2010/366.pdf.
    • (2010)
    • Pinkas, B.1    Reinman, T.2
  • 15
    • 84893808472 scopus 로고    scopus 로고
    • Search pattern leakage in searchable encryption: Attacks and new construction
    • [15] Liu, C., Zhu, L., Wang, M., Tan, Y., Search pattern leakage in searchable encryption: Attacks and new construction. Inform. Sci. 265 (2014), 176–188.
    • (2014) Inform. Sci. , vol.265 , pp. 176-188
    • Liu, C.1    Zhu, L.2    Wang, M.3    Tan, Y.4
  • 16
    • 0342880858 scopus 로고
    • Studiesin secure multi-party computation and applications
    • (Ph.D. thesis) Weizmann Institue of Science Israel
    • [16] Canetti, R., Studiesin secure multi-party computation and applications. (Ph.D. thesis), 1995, Weizmann Institue of Science, Israel.
    • (1995)
    • Canetti, R.1
  • 18
    • 85012302781 scopus 로고    scopus 로고
    • Malicious-client security in Blind Seer: A scalable private DBMS
    • in: IEEE Symposium on Security and Privacy URL:.
    • [18] B.A. Fisch, B. Vo, F. Krell, A. Kumarasubramanian, V. Kolesnikov, T. Malkin, S.M. Bellovin, Malicious-client security in Blind Seer: A scalable private DBMS, in: IEEE Symposium on Security and Privacy, 2015. URL: http://www.ieee-security.org/TC/SP2015/papers/6949a395.pdf.
    • (2015)
    • Fisch, B.A.1    Vo, B.2    Krell, F.3    Kumarasubramanian, A.4    Kolesnikov, V.5    Malkin, T.6    Bellovin, S.M.7
  • 22
    • 0003741171 scopus 로고
    • Statistical Tables for Biological, Agricultural and Medical Research
    • third ed. Oliver & Boyd London
    • [22] Ronald, A.F., Frank, S.Y., Statistical Tables for Biological, Agricultural and Medical Research. third ed., 1948, Oliver & Boyd, London.
    • (1948)
    • Ronald, A.F.1    Frank, S.Y.2
  • 23
    • 0008489840 scopus 로고
    • Seminumerical algorithms
    • [23] Donald, E.K., Seminumerical algorithms. Art Comput. Program. 2 (1969), 124–125.
    • (1969) Art Comput. Program. , vol.2 , pp. 124-125
    • Donald, E.K.1
  • 24
    • 0000886528 scopus 로고
    • Algorithm 235: Random permutation
    • [24] Durstenfeld, R., Algorithm 235: Random permutation. Commun. ACM 7 (1964), 420–421.
    • (1964) Commun. ACM , vol.7 , pp. 420-421
    • Durstenfeld, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.