메뉴 건너뛰기




Volumn 15, Issue 3, 2018, Pages 496-510

Searchable Encryption over Feature-Rich Data

Author keywords

Cloud storage; homomorphic encryption; proximity search; searchable encryption; similarity search

Indexed keywords

DATA STRUCTURES; DIGITAL STORAGE; FUZZY FILTERS;

EID: 85038858282     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2016.2593444     Document Type: Article
Times cited : (132)

References (31)
  • 6
    • 84976428104 scopus 로고    scopus 로고
    • Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
    • May
    • S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data," IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, May 2016.
    • (2016) IEEE Trans. Image Process. , vol.25 , Issue.7 , pp. 3411-3425
    • Hu, S.1    Wang, Q.2    Wang, J.3    Qin, Z.4    Ren, K.5
  • 7
    • 85100706388 scopus 로고    scopus 로고
    • Dynamic proofs of retrievability for coded cloud storage systems
    • Sep.
    • Z. Ren, L. Wang, Q. Wang, and M. Xu, "Dynamic proofs of retrievability for coded cloud storage systems," IEEE Trans. Service Comput., vol. PP, no. 99, pp. 1-1, Sep. 2015, Doi: 10.1109/TSC.2015.2481880.
    • (2015) IEEE Trans. Service Comput. , vol.PP , Issue.99 , pp. 1
    • Ren, Z.1    Wang, L.2    Wang, Q.3    Xu, M.4
  • 8
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Feb.
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 13
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in Proc. 4th Theory Cryptography Conf., 2007, pp. 535-554.
    • (2007) Proc. 4th Theory Cryptography Conf. , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 15
    • 0000681228 scopus 로고    scopus 로고
    • A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces
    • R. Weber, H.-J. Schek, and S. Blott, "A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces," in Proc. 24th Int. Conf. Very Large Data Bases, 1998, pp. 194-205.
    • (1998) Proc. 24th Int. Conf. Very Large Data Bases , pp. 194-205
    • Weber, R.1    Schek, H.-J.2    Blott, S.3
  • 17
    • 84923867173 scopus 로고    scopus 로고
    • ADAM - Database and information retrieval system for big multimedia collections
    • I. Giangreco, I. Al Kabary, and H. Schuldt, "ADAM - Database and information retrieval system for big multimedia collections," in Proc. IEEE Int. Congr. Big Data, 2014, pp. 406-413.
    • (2014) Proc. IEEE Int. Congr. Big Data , pp. 406-413
    • Giangreco, I.1    Al Kabary, I.2    Schuldt, H.3
  • 19
    • 0038633576 scopus 로고    scopus 로고
    • Properties of embedding methods for similarity searching in metric spaces
    • May
    • G. R. Hjaltason and H. Samet, "Properties of embedding methods for similarity searching in metric spaces," IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 5, pp. 530-549, May 2003.
    • (2003) IEEE Trans. Pattern Anal. Mach. Intell. , vol.25 , Issue.5 , pp. 530-549
    • Hjaltason, G.R.1    Samet, H.2
  • 21
    • 84883119889 scopus 로고    scopus 로고
    • Efficient privacy-preserving biometric identification in cloud computing
    • J. Yuan and S. Yu, "Efficient privacy-preserving biometric identification in cloud computing," in Proc. IEEE INFOCOM, 2013, pp. 2652-2660.
    • (2013) Proc. IEEE INFOCOM , pp. 2652-2660
    • Yuan, J.1    Yu, S.2
  • 23
    • 84904421834 scopus 로고    scopus 로고
    • Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud
    • B. Wang, S. Yu, W. Lou, and Y. T. Hou, "Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, 2014, pp. 2112-2120.
    • (2014) Proc. IEEE INFOCOM , pp. 2112-2120
    • Wang, B.1    Yu, S.2    Lou, W.3    Hou, Y.T.4
  • 25
    • 40549119527 scopus 로고    scopus 로고
    • Features for image retrieval: An experimental comparison
    • T. Deselaers, D. Keysers, and H. Ney, "Features for image retrieval: An experimental comparison," Inf. Retrieval, vol. 11, no. 2, pp. 77-107, 2008.
    • (2008) Inf. Retrieval , vol.11 , Issue.2 , pp. 77-107
    • Deselaers, T.1    Keysers, D.2    Ney, H.3
  • 26
    • 84871949205 scopus 로고    scopus 로고
    • Approximate nearest neighbor: Towards removing the curse of dimensionality
    • S. Har-Peled, P. Indyk, and R. Motwani, "Approximate nearest neighbor: Towards removing the curse of dimensionality," Theory Comput., vol. 8, no. 1, pp. 321-350, 2012.
    • (2012) Theory Comput. , vol.8 , Issue.1 , pp. 321-350
    • Har-Peled, S.1    Indyk, P.2    Motwani, R.3
  • 28
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 223-238.
    • (1999) Proc. Int. Conf. Theory Appl. Cryptographic Techn. , pp. 223-238
    • Paillier, P.1
  • 30
    • 70350660774 scopus 로고    scopus 로고
    • A posteriori multi-probe locality sensitive hashing
    • A. Joly and O. Buisson, "A posteriori multi-probe locality sensitive hashing," in Proc. 16th ACM Int. Conf. Multimedia, 2008, pp. 209-218.
    • (2008) Proc. 16th ACM Int. Conf. Multimedia , pp. 209-218
    • Joly, A.1    Buisson, O.2
  • 31
    • 77953184849 scopus 로고    scopus 로고
    • Kernelized locality-sensitive hashing for scalable image search
    • B. Kulis and K. Grauman, "Kernelized locality-sensitive hashing for scalable image search," in Proc. IEEE 12th Int. Conf. Comput. Vision, 2009, pp. 2130-2137.
    • (2009) Proc. IEEE 12th Int. Conf. Comput. Vision , pp. 2130-2137
    • Kulis, B.1    Grauman, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.