Traffic Load Reduction of Multi-owner, Multikeywords and Multi-user Searches Using Parallel Searching and Cache Trapdoors
暂无分享,去创建一个
[1] Chen Yanli,et al. Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing , 2016 .
[2] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[3] Irfan Darmawan,et al. Integration of Genetic and Tabu Search algorithm based load balancing for heterogenous grid computing , 2013, 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA).
[4] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[5] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[6] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[7] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[9] Baisa L. Gunjal,et al. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing , 2016 .
[10] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[11] T. Sudha,et al. Oruta: Privacy- Preserving Public Auditing for Shared Data in the Cloud , 2018 .
[12] Chi-Yao Weng,et al. A shareable keyword search over encrypted data in cloud computing , 2015, The Journal of Supercomputing.
[13] Lucas Ballard,et al. Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.
[14] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[15] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[16] Meikang Qiu,et al. A Review on Cloud Computing: Design Challenges in Architecture and Security , 2011, J. Comput. Inf. Technol..
[17] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[18] M. Chuah,et al. Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted Data , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[19] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[20] Fagen Li,et al. Broadcast Searchable Keyword Encryption , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.
[21] Yi Yang,et al. Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[22] Yanbin Lu,et al. Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud , 2012, NDSS.