Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds

[1]  Laurence T. Yang,et al.  Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.

[2]  Lei Zhang,et al.  MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing , 2016, Secur. Commun. Networks.

[3]  Mianxiong Dong,et al.  Private and Flexible Urban Message Delivery , 2016, IEEE Transactions on Vehicular Technology.

[4]  Xiaohui Liang,et al.  PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[5]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[6]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[7]  Juhnyoung Lee,et al.  A view of cloud computing , 2010, CACM.

[8]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[9]  Yeim-Kuan Chang,et al.  Fast binary and multiway prefix searches for packet forwarding , 2007, Comput. Networks.

[10]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[11]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[12]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[13]  Paul E. Jones,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[14]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.

[15]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[16]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[17]  M. V. Ramakrishna,et al.  Practical performance of Bloom filters and parallel free-text searching , 1989, CACM.

[18]  Ambadas Wairagar,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2016 .

[19]  Mianxiong Dong,et al.  NetSecCC: A scalable and fault-tolerant architecture for cloud computing security , 2016, Peer-to-Peer Netw. Appl..

[20]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[21]  Karl N. Levitt,et al.  hBFT: Speculative Byzantine Fault Tolerance with Minimum Cost , 2015, IEEE Transactions on Dependable and Secure Computing.

[22]  Miguel Correia,et al.  Efficient Byzantine Fault-Tolerance , 2013, IEEE Transactions on Computers.

[23]  Hai Jin,et al.  Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2010, IACR Cryptol. ePrint Arch..

[24]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[25]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[26]  Alex X. Liu,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks , 2022 .