Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services
暂无分享,去创建一个
Sungyoung Lee | Zeeshan Pervez | Asad Masood Khattak | Mahmood Ahmad | Tae Choong Chung | Sungyoung Lee | T. Chung | A. Khattak | Zeeshan Pervez | Mahmood Ahmad
[1] Young-Koo Lee,et al. SAPDS: self-healing attribute-based privacy aware data sharing in cloud , 2011, The Journal of Supercomputing.
[2] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[3] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[4] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[5] Lakshmi Sobhana Kalli,et al. Market-Oriented Cloud Computing : Vision , Hype , and Reality for Delivering IT Services as Computing , 2013 .
[6] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[7] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[8] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[9] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[10] Charalampos Papamanthou,et al. CS2: A Searchable Cryptographic Cloud Storage System , 2011 .
[11] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[14] Tatsuaki Okamoto,et al. Hierarchical Predicate Encryption for Inner-Products , 2009, ASIACRYPT.
[15] Christian Schild,et al. Google Search Appliance , 2012 .
[16] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[17] Mudhakar Srivatsa,et al. Search-as-a-service: Outsourced search over outsourced storage , 2009, TWEB.
[18] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[19] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[20] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[21] S. Rajsbaum. Foundations of Cryptography , 2014 .
[22] Yi Mu,et al. Privacy enhanced data outsourcing in the cloud , 2012, J. Netw. Comput. Appl..
[23] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..
[24] Sheng Zhong,et al. Privacy-Preserving Queries on Encrypted Data , 2006, ESORICS.
[25] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[26] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[27] Toby Velte,et al. Cloud Computing, A Practical Approach , 2009 .
[28] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[29] Sungyoung Lee,et al. Privacy-aware searching with oblivious term matching for cloud storage , 2012, The Journal of Supercomputing.