Secure keyword search using dual encryption in cloud computing
暂无分享,去创建一个
[1] Dhishan Dhammearatchi,et al. Cloud computing – Enhancement of Security with respect to Encryption and secure APIs , 2016 .
[2] Weiming Zhang,et al. Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search , 2015, IEEE Transactions on Information Forensics and Security.
[3] Xingming Sun,et al. Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.
[4] Guang Gong,et al. Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).
[5] Swati Kashyap,et al. A Review on: Network Security and Cryptographic Algorithm , 2015 .
[6] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[8] Debahuti Mishra,et al. Improved search technique using wildcards or truncation , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.
[9] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Debahuti Mishra,et al. Search Technique Using Wildcards or Truncation: A Tolerance Rough Set Clustering Approach , 2010 .
[11] Rongzhi Wang. Research on Data Security Technology Based on Cloud Storage , 2017 .
[12] Qiang Tang,et al. A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[13] Neelam S. Khan,et al. Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).
[14] Qiang Tang,et al. A New Efficient Verifiable Fuzzy Keyword Search Scheme , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[15] Prerna Mahajan,et al. A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .
[16] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[17] G. Sahoo,et al. Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2013, CloudCom 2013.
[18] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[19] E. Anita,et al. A survey on data breach challenges in cloud computing security: Issues and threats , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).
[20] David Hutchison,et al. Malware Detection in Cloud Computing Infrastructures , 2016, IEEE Transactions on Dependable and Secure Computing.
[21] M. Avram,et al. Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .
[22] Monjur Ahmed,et al. Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.
[23] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[24] Aaron Gomes. CLOUD COMPUTING: PLATFORM AS A SERVICE , 2014 .
[25] Narendra Shekokar,et al. Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing , 2015 .
[26] Ramayya Krishnan,et al. Privacy-preserving similarity-based text retrieval , 2010, TOIT.
[27] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[28] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[29] Jun Yu,et al. Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.
[30] Manoj Kokane,et al. Data Storage Security in Cloud Computing , 2013 .