FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data
暂无分享,去创建一个
[1] S Smys,et al. Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment , 2020, Wirel. Pers. Commun..
[2] Duraipandian M. Dr,et al. CLOUD BASED INTERNET OF THINGS FOR SMART CONNECTED OBJECTS , 2019, Journal of ISMAC.
[3] Haoxiang Wang,et al. Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings , 2017, Future Gener. Comput. Syst..
[4] S. Smys,et al. Ensuring data security in cloud based social networks , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).
[5] Sunilkumar S. Manvi,et al. Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..
[6] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[7] Jie Wu,et al. Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..
[8] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[9] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[10] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[11] Jie Wu,et al. An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.
[12] Guoliang Li,et al. Efficient interactive fuzzy keyword search , 2009, WWW '09.
[13] Jiaheng Lu,et al. Space-Constrained Gram-Based Indexing for Efficient Approximate String Search , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[14] Robert H. Deng,et al. Private Query on Encrypted Data in Multi-user Settings , 2008, ISPEC.
[15] Jiaheng Lu,et al. Efficient Merging and Filtering Algorithms for Approximate String Searches , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[17] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[18] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[19] Michael Mitzenmacher,et al. Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.
[20] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[21] Joan Feigenbaum,et al. Secure multiparty computation of approximations , 2001, TALG.
[22] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[23] Hui Li,et al. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Trans. Parallel Distributed Syst..
[24] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[25] Bhaswati Hazarika,et al. Survey Paper on Cloud Computing & Cloud Monitoring: Basics , 2015 .