Distributed Shuffle Index in the Cloud: Implementation and Evaluation
暂无分享,去创建一个
Marco Rosa | Sabrina De Capitani di Vimercati | Stefano Paraboschi | Pierangela Samarati | Sara Foresti | Enrico Bacis
[1] Gerardo Pelosi,et al. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[2] Keke Gai,et al. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..
[3] Vincenzo Piuri,et al. Supporting Security Requirements for Resource Management in Cloud Computing , 2012, 2012 IEEE 15th International Conference on Computational Science and Engineering.
[4] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[5] Marco Rosa,et al. Managing Data Sharing in OpenStack Swift with Over-Encryption , 2016, WISCS@CCS.
[6] Gerardo Pelosi,et al. Distributed Shuffling for Preserving Access Confidentiality , 2013, ESORICS.
[7] Sara Foresti,et al. Preserving Privacy in Data Outsourcing , 2010, Advances in Information Security.
[8] Gerardo Pelosi,et al. Shuffle Index , 2015, ACM Trans. Storage.
[9] Elaine Shi,et al. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM , 2016, TCC.
[10] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[11] Gerardo Pelosi,et al. Three-Server Swapping for Access Confidentiality , 2018, IEEE Transactions on Cloud Computing.
[12] Murat Kantarcioglu,et al. Inference attack against encrypted range queries on outsourced databases , 2014, CODASPY '14.
[13] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[14] Elaine Shi,et al. Multi-cloud oblivious storage , 2013, CCS.
[15] Sabrina De Capitani di Vimercati,et al. Managing and accessing data in the cloud: Privacy risks and approaches , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).
[16] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.