메뉴 건너뛰기




Volumn 6, Issue 2, 2018, Pages 492-505

Three-Server Swapping for Access Confidentiality

Author keywords

access confidentiality; content confidentiality; distributed swapping; pattern confidentiality; Shuffle index

Indexed keywords

COMPUTER PROGRAMMING;

EID: 85048246767     PISSN: None     EISSN: 21687161     Source Type: Journal    
DOI: 10.1109/TCC.2015.2449993     Document Type: Article
Times cited : (11)

References (23)
  • 2
    • 84899006582 scopus 로고    scopus 로고
    • Inference attack against encrypted range queries on outsourced databases
    • San Antonio, TX, USA, Mar
    • M. Islam, M. Kuzu, and M. Kantarcioglu, "Inference attack against encrypted range queries on outsourced databases," in Proc. 4th ACM Conf. Data Appl. Security Privacy, San Antonio, TX, USA, Mar. 2014, pp. 235-246.
    • (2014) Proc. 4th ACM Conf. Data Appl. Security Privacy , pp. 235-246
    • Islam, M.1    Kuzu, M.2    Kantarcioglu, M.3
  • 3
    • 84878298643 scopus 로고    scopus 로고
    • Enhancing access privacy of range retrievals over B+-trees
    • Jul
    • H. Pang, J. Zhang, and K. Mouratidis, "Enhancing access privacy of range retrievals over B+-trees," IEEE Trans. Knowl. Data Eng., vol. 25, no. 7, pp. 1533-1547, Jul. 2013.
    • (2013) IEEE Trans. Knowl. Data Eng. , vol.25 , Issue.7 , pp. 1533-1547
    • Pang, H.1    Zhang, J.2    Mouratidis, K.3
  • 6
    • 84874048096 scopus 로고    scopus 로고
    • Supporting security requirements for resource management in cloud computing
    • Paphos, Cyprus, Dec
    • R. Jhawar, V. Piuri, and P. Samarati, "Supporting security requirements for resource management in cloud computing," in Proc. 15th Int. Conf. Comput. Sci. Eng., Paphos, Cyprus, Dec. 2012, pp. 170-177.
    • (2012) Proc. 15th Int. Conf. Comput. Sci. Eng. , pp. 170-177
    • Jhawar, R.1    Piuri, V.2    Samarati, P.3
  • 8
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, WI, USA, Jun
    • H. Hacig€um€us, B. Iyer, S. Mehrotra, and C. Li, "Executing SQL over encrypted data in the database-service-provider model," in Proc. ACM SIGMOD Int. Conf. Manag. Data, Madison, WI, USA, Jun. 2002, pp. 216-227.
    • (2002) Proc. ACM SIGMOD Int. Conf. Manag. Data , pp. 216-227
    • Hacigumus, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 9
    • 84863511940 scopus 로고    scopus 로고
    • Enabling secure and efficient ranked keyword search over outsourced cloud data
    • Aug
    • C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Process. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
    • (2012) IEEE Trans. Parallel Distrib. Process. Syst. , vol.23 , Issue.8 , pp. 1467-1479
    • Wang, C.1    Cao, N.2    Ren, K.3    Lou, W.4
  • 10
    • 38049002436 scopus 로고    scopus 로고
    • A survey of single-database private information retrieval: Techniques and applications
    • Beijing, China, Apr
    • R. Ostrovsky and W. E. Skeith, III, "A survey of single-database private information retrieval: Techniques and applications," in Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography, Beijing, China, Apr. 2007, pp. 393-411.
    • (2007) Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography , pp. 393-411
    • Ostrovsky, R.1    Skeith, W.E.2
  • 11
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • Prague, Czech Republic, May
    • C. Cachin, S. Micali, and M. Stadler, "Computationally private information retrieval with polylogarithmic communication," in Proc. Int. Conf. Theory Appl. Cryptographic Tech., Prague, Czech Republic, May 1999, pp. 402-414.
    • (1999) Proc. Int. Conf. Theory Appl. Cryptographic Tech. , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 12
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • Alexandria, VA, USA, October
    • P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in Proc. 15th ACM Conf. Comput. Commun. Security, Alexandria, VA, USA, October 2008, pp. 139-148.
    • (2008) Proc. 15th ACM Conf. Comput. Commun. Security , pp. 139-148
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 13
    • 84881250193 scopus 로고    scopus 로고
    • ObliviStore: High performance oblivious cloud storage
    • San Francisco, CA, USA, May
    • E. Stefanov and E. Shi, "ObliviStore: High performance oblivious cloud storage," in Proc. IEEE Symp. Security Privacy, San Francisco, CA, USA, May 2013, pp. 253-267.
    • (2013) Proc. IEEE Symp. Security Privacy , pp. 253-267
    • Stefanov, E.1    Shi, E.2
  • 16
    • 84873955790 scopus 로고    scopus 로고
    • Distributed oblivious RAM for secure two-party computation
    • Tokyo, Japan, Mar
    • S. Lu and R. Ostrovsky, "Distributed oblivious RAM for secure two-party computation," in Proc. 10th Theory Cryptography Conf., Tokyo, Japan, Mar. 2013, pp. 377-396.
    • (2013) Proc. 10th Theory Cryptography Conf. , pp. 377-396
    • Lu, S.1    Ostrovsky, R.2
  • 18
    • 33646382224 scopus 로고    scopus 로고
    • Hiding traversal of tree structured data from untrusted data stores
    • Porto, Portugal, Apr
    • P. Lin and K. Candan, "Hiding traversal of tree structured data from untrusted data stores," in Proc. 2nd Int. Workshop Security Inf. Syst., Porto, Portugal, Apr. 2004, pp. 314-323.
    • (2004) Proc. 2nd Int. Workshop Security Inf. Syst. , pp. 314-323
    • Lin, P.1    Candan, K.2
  • 19
    • 80053005931 scopus 로고    scopus 로고
    • A light-weight solution to preservation of access pattern privacy in un-trusted clouds
    • Leuven, Belgium, Sep
    • K. Yang, J. Zhang, W. Zhang, and D. Qiao, "A light-weight solution to preservation of access pattern privacy in un-trusted clouds," in Proc. 16th Eur. Symp. Res. Comput. Security, Leuven, Belgium, Sep. 2011, pp. 528-547.
    • (2011) Proc. 16th Eur. Symp. Res. Comput. Security , pp. 528-547
    • Yang, K.1    Zhang, J.2    Zhang, W.3    Qiao, D.4
  • 21
    • 84881468744 scopus 로고    scopus 로고
    • Supporting concurrency and multiple indexes in private access to outsourced data
    • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, "Supporting concurrency and multiple indexes in private access to outsourced data," J. Comput. Security, vol. 21, no. 3, pp. 425-461, 2013.
    • (2013) J. Comput. Security , vol.21 , Issue.3 , pp. 425-461
    • De Capitanidi, V.S.1    Foresti, S.2    Paraboschi, S.3    Pelosi, G.4    Samarati, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.