An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
暂无分享,去创建一个
Wei Zhang | Yaping Lin | Tianyue Peng | Xin Yao | Wei Zhang | Yaping Lin | Tianyue Peng | Xin Yao
[1] Ian H. Witten,et al. Managing Gigabytes: Compressing and Indexing Documents and Images , 1999 .
[2] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[5] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[6] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[7] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008 .
[8] Jaroslav Pokorný,et al. Extending Fagin's Algorithm for More Users Based on Multidimensional B-Tree , 2008, ADBIS.
[9] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[10] Ray R. Larson. Introduction to Information Retrieval , 2010 .
[11] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[12] M. Chuah,et al. Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[13] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[14] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[15] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[16] Hai Jin,et al. Secure Rank-Ordered Search of Multi-keyword Trapdoor over Encrypted Cloud Data , 2012, 2012 IEEE Asia-Pacific Services Computing Conference.
[17] Ruixuan Li,et al. Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.
[18] Rui Li,et al. A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.
[19] Jiwu Shu,et al. Preferred keyword search over encrypted data in cloud computing , 2013, 2013 IEEE/ACM 21st International Symposium on Quality of Service (IWQoS).
[20] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[21] Murat Kantarcioglu,et al. A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[22] Ruixuan Li,et al. Efficient multi-keyword ranked query over encrypted data in cloud computing , 2014, Future Gener. Comput. Syst..
[23] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[24] Hari Balakrishnan,et al. Building Web Applications on Top of Encrypted Data Using Mylar , 2014, NSDI.
[25] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[26] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[27] Yaping Lin,et al. Efficient and privacy-preserving search in multi-source personal health record clouds , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[28] Mark Zhandry,et al. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation , 2015, EUROCRYPT.
[29] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..
[30] David J. Wu,et al. Practical Order-Revealing Encryption with Limited Leakage , 2016, FSE.
[31] Cong Wang,et al. Enabling secure and effective near-duplicate detection over encrypted in-network storage , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[32] David J. Wu,et al. Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds , 2016, IACR Cryptol. ePrint Arch..
[33] Baisa L. Gunjal,et al. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing , 2016 .
[34] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[35] Jinjun Chen,et al. Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud , 2017, J. Netw. Comput. Appl..
[36] Yaping Lin,et al. Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud , 2018, IEEE Access.