메뉴 건너뛰기




Volumn 5, Issue 1, 2017, Pages 126-139

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

Author keywords

energy efficiency; Mobile cloud storage; searchable data encryption; traffic efficiency

Indexed keywords

BANDWIDTH; COMPUTER ARCHITECTURE; CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; ENERGY CONSERVATION; ENERGY EFFICIENCY; ENERGY UTILIZATION; MOBILE DEVICES; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE;

EID: 85021847532     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2015.2398426     Document Type: Article
Times cited : (30)

References (48)
  • 2
    • 84860159525 scopus 로고    scopus 로고
    • Design of security solution to mobile cloud storage
    • New York, NY, USA: Springer
    • X. Yu and Q. Wen, "Design of security solution to mobile cloud storage," in Knowledge Discovery and Data Mining. New York, NY, USA: Springer, 2012, pp. 255-263.
    • (2012) Knowledge Discovery and Data Mining , pp. 255-263
    • Yu, X.1    Wen, Q.2
  • 4
    • 84866763081 scopus 로고    scopus 로고
    • Impact of storage acquisition intervals on the cost-efficiency of the private vs. Public storage
    • O. Mazhelis, G. Fazekas, and P. Tyrvainen, "Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage," in Proc. IEEE 5th Int. Conf. Cloud Comput., 2012, pp. 646-653.
    • (2012) Proc. IEEE 5th Int. Conf. Cloud Comput. , pp. 646-653
    • Mazhelis, O.1    Fazekas, G.2    Tyrvainen, P.3
  • 6
    • 77951558980 scopus 로고    scopus 로고
    • When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments
    • J. Oberheide and F. Jahanian, "When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments," in Proc. 11th Workshop Mobile Comput. Syst. Appl., 2010, pp. 43-48.
    • (2010) Proc. 11th Workshop Mobile Comput. Syst. Appl. , pp. 43-48
    • Oberheide, J.1    Jahanian, F.2
  • 13
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug.
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 15
    • 84905923774 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • Jan.
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222-233, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 222-233
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 16
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
    • B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE Conf. Comput. Commun., 2014, pp. 2112-2120.
    • (2014) Proc. IEEE Conf. Comput. Commun. , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 17
    • 33747729581 scopus 로고    scopus 로고
    • Inverted files for text search engines
    • J. Zobel and A. Moffat, "Inverted files for text search engines," ACM Comput. Surveys, vol. 38, no. 2, p. 6, 2006.
    • (2006) ACM Comput. Surveys , vol.38 , Issue.2 , pp. 6
    • Zobel, J.1    Moffat, A.2
  • 20
    • 77950327510 scopus 로고    scopus 로고
    • Using tf-idf to determine word relevance in document queries
    • Tech. Rep. 14th, [Online]
    • J. Ramos, "Using tf-idf to determine word relevance in document queries," in Proc. First Instructional Conf. Machine Learning, Tech. Rep. 14th, 2003. [Online]. Available: https://www.cs.rutgers. edu/mlittman/courses/ml03/iCML03/papers/ramos.pdf
    • (2003) Proc. First Instructional Conf. Machine Learning
    • Ramos, J.1
  • 21
    • 0000600049 scopus 로고    scopus 로고
    • A probabilistic justification for using tf-idf term weighting in information retrieval
    • D. Hiemstra, "A probabilistic justification for using tf-idf term weighting in information retrieval," Int. J. Digital Libraries, vol. 3, no. 2, pp. 131-139, 2000.
    • (2000) Int. J. Digital Libraries , vol.3 , Issue.2 , pp. 131-139
    • Hiemstra, D.1
  • 22
    • 0000127441 scopus 로고
    • Index term weighting
    • K. Jones, "Index term weighting," Inf. Storage Retrieval, vol. 9, no. 11, pp. 619-633, 1973.
    • (1973) Inf. Storage Retrieval , vol.9 , Issue.11 , pp. 619-633
    • Jones, K.1
  • 23
    • 84871978542 scopus 로고    scopus 로고
    • Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers
    • Q. Chai and G. Gong, "Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers," in Proc. IEEE Int. Conf. Commun., 2012, pp. 917-922.
    • (2012) Proc. IEEE Int. Conf. Commun. , pp. 917-922
    • Chai, Q.1    Gong, G.2
  • 25
    • 84881537144 scopus 로고    scopus 로고
    • Toward privacyassured and searchable cloud data storage services
    • Jul./Aug.
    • M. Li, S. Yu, K. Ren, W. Lou, and Y. T. Hou, "Toward privacyassured and searchable cloud data storage services," IEEE Netw., vol. 27, no. 4, pp. 56-62, Jul./Aug. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.4 , pp. 56-62
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4    Hou, Y.T.5
  • 27
    • 79960850152 scopus 로고    scopus 로고
    • Privacy-preserving multi-keyword ranked search over encrypted cloud data
    • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. IEEE Conf. Comput. Commun., 2011, pp. 829-837.
    • (2011) Proc. IEEE Conf. Comput. Commun. , pp. 829-837
    • Cao, N.1    Wang, C.2    Li, M.3    Ren, K.4    Lou, W.5
  • 30
    • 0037213089 scopus 로고    scopus 로고
    • An information-theoretic perspective of tf-idf measures
    • A. Aizawa, "An information-theoretic perspective of tf-idf measures," Inf. Process. Manage., vol. 39, pp. 45-65, 2003.
    • (2003) Inf. Process. Manage. , vol.39 , pp. 45-65
    • Aizawa, A.1
  • 38
    • 84864128069 scopus 로고    scopus 로고
    • Efficient and secure ranked multi-keyword search on encrypted cloud data
    • C. Örencik and E. Savaş, "Efficient and secure ranked multi-keyword search on encrypted cloud data," in Proc. Joint EDBT/ICDT Workshops, 2012, pp. 186-195.
    • (2012) Proc. Joint EDBT/ICDT Workshops , pp. 186-195
    • Örencik, C.1    Savaş, E.2
  • 40
    • 84875096069 scopus 로고    scopus 로고
    • Additive order preserving encryption based encrypted documents ranking in secure cloud storage
    • J. Zhang, B. Deng, and X. Li, "Additive order preserving encryption based encrypted documents ranking in secure cloud storage," in Proc. 3rd Int. Conf. Adv. Swarm Intell., 2012, pp. 58-65.
    • (2012) Proc. 3rd Int. Conf. Adv. Swarm Intell. , pp. 58-65
    • Zhang, J.1    Deng, B.2    Li, X.3
  • 41
    • 77649261628 scopus 로고    scopus 로고
    • Ph.D. dissertation, Department of Computer Science, Stanford Univ., Stanford, CA, USA
    • C. Gentry, "A fully homomorphic encryption scheme," Ph.D. dissertation, Department of Computer Science, Stanford Univ., Stanford, CA, USA, 2009.
    • (2009) A Fully Homomorphic Encryption Scheme
    • Gentry, C.1
  • 43
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy?
    • K. Kumar and Y. Lu, "Cloud computing for mobile users: Can offloading computation save energy?" Computer, vol. 43, no. 4, pp. 51-56, 2010.
    • (2010) Computer , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.2
  • 46
    • 85027551307 scopus 로고    scopus 로고
    • [Online]
    • Wikipedia. (2015). [Online]. Available: http://en.wikipedia.org/ wiki/tf-idf
    • (2015)
  • 47
    • 0002848777 scopus 로고    scopus 로고
    • Exploring the similarity space
    • J. Zobel and A. Moffat, "Exploring the similarity space," ACM SIGIR Forum, vol. 32, no. 1, pp. 18-34, 1998.
    • (1998) ACM SIGIR Forum , vol.32 , Issue.1 , pp. 18-34
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.