Effective Data Utilization in Public Cloud through Hash Table Assorted Trie Indexed Encrypted Fuzzy Search

[1]  Grace T. R. Lin,et al.  Fuzzy Modeling for Information Security Management Issues in Cloud Computing , 2014 .

[2]  Debajyoti Mukhopadhyay,et al.  Efficient Fuzzy Search Engine with B -Tree Search Mechanism , 2014, 2014 International Conference on Information Technology.

[3]  Yiwei Thomas Hou,et al.  Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[4]  He Jing,et al.  K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing , 2013 .

[5]  Cong Wang,et al.  Toward secure and effective data utilization in public cloud , 2012, IEEE Network.

[6]  Shouzhen Zeng,et al.  Fuzzy Generalized Ordered Weighted Averaging Distance Operator and Its Application to Decision Making , 2012 .

[7]  Jie Wu,et al.  Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..

[8]  Sun-Yuan Hsieh,et al.  Multiprefix Trie: A New Data Structure for Designing Dynamic Router-Tables , 2011, IEEE Transactions on Computers.

[9]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[10]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[11]  Yujian Du,et al.  Cloud Computing: An Overview , 2009, CloudCom.

[12]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[13]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[14]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[15]  S. Subbotin,et al.  The decision tree construction based on a stochastic search for the neuro-fuzzy network synthesis , 2015, Optical Memory and Neural Networks.

[16]  Qiang Tang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[17]  Min-Shiang Hwang,et al.  A Study of Public Key Encryption with Keyword Search , 2013, Int. J. Netw. Secur..

[18]  Qiang Tang,et al.  A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[19]  Hai Jin,et al.  Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2010, IACR Cryptol. ePrint Arch..

[20]  Sartaj Sahni,et al.  Efficient Construction of Pipelined Multibit-Trie Router-Tables , 2007, IEEE Transactions on Computers.