FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data

[1]  S Smys,et al.  Hybrid RSAECC Based Secure Communication in Mobile Cloud Environment , 2020, Wirel. Pers. Commun..

[2]  Duraipandian M. Dr,et al.  CLOUD BASED INTERNET OF THINGS FOR SMART CONNECTED OBJECTS , 2019, Journal of ISMAC.

[3]  Haoxiang Wang,et al.  Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings , 2017, Future Gener. Comput. Syst..

[4]  S. Smys,et al.  Ensuring data security in cloud based social networks , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[5]  Sunilkumar S. Manvi,et al.  Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..

[6]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Jie Wu,et al.  Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..

[8]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[9]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[10]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[11]  Jie Wu,et al.  An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing , 2009, 2009 International Conference on Computational Science and Engineering.

[12]  Guoliang Li,et al.  Efficient interactive fuzzy keyword search , 2009, WWW '09.

[13]  Jiaheng Lu,et al.  Space-Constrained Gram-Based Indexing for Efficient Approximate String Search , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[14]  Robert H. Deng,et al.  Private Query on Encrypted Data in Multi-user Settings , 2008, ISPEC.

[15]  Jiaheng Lu,et al.  Efficient Merging and Filtering Algorithms for Approximate String Searches , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[16]  Mihir Bellare,et al.  Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.

[17]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[18]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[19]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[20]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[21]  Joan Feigenbaum,et al.  Secure multiparty computation of approximations , 2001, TALG.

[22]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Hui Li,et al.  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Trans. Parallel Distributed Syst..

[24]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  Bhaswati Hazarika,et al.  Survey Paper on Cloud Computing & Cloud Monitoring: Basics , 2015 .