Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search
暂无分享,去创建一个
Weiming Zhang | Nenghai Yu | Ke Li | Ce Yang | Nenghai Yu | Weiming Zhang | Ce Yang | Ke Li
[1] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[2] I-Ling Yen,et al. Security analysis for order preserving encryption schemes , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[3] Peter Bailey,et al. The CSIRO enterprise search test collection , 2007, SIGF.
[4] G. Zipf,et al. The Psycho-Biology of Language , 1936 .
[5] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[6] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[7] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[8] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[9] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[10] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[11] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[12] J SivaSankar,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2015 .
[13] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[14] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[15] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[16] G. Āllport. The Psycho-Biology of Language. , 1936 .
[17] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[18] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[19] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[20] George E. P. Box,et al. Statistical process monitoring and feedback adjustment: a discussion , 1992 .
[21] W. A. Taylor. Change-Point Analysis : A Powerful New Tool For Detecting Changes , 2000 .
[22] Wolfgang Nejdl,et al. Zerber+R: top-k retrieval from a confidential index , 2009, EDBT '09.
[23] Charles L. A. Clarke,et al. A security model for full-text file system search in multi-user environments , 2005, FAST'05.
[24] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.