Multikeyword Ranked Search over Cloud Data
Abstract
Keywords
Full Text:
PDFReferences
Jin Li, Qian Wang , Cong Wang, Ning Cao , Kui Ren , and Wenjing Lou " Fuzzy Keyword Search over Encrypted Data in Cloud Computing" IJERA transactions,Vol.2,Issue 2, Mar-Apr 2012.
Peng Xu and Hai Jin "Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack" IEEE transactions, Vol 62, Issue 11, Sep 2012.
Ning Cao,Cong Wang, Ming Li, Kui Ren,and WenjingLou "Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data" IEEE transactions on parallel and distributed systems, vol. 25, no. 1, January 2014.
Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu "Efficient Similarity Search over Encrypted Data" IJARCSSE transactions, Vol 2, Issue 10, Oct 2012.
Wei Zhang ,Sheng Xiao, Yaping Lin, Ting Zhou , Siwang Zhou " Secure Ranked Multi- keyword Search for Multiple Data Owners in Cloud Computing" IJETAE transactions,Vol 4,Issue 2,Feb 2014.
Zhiyong Xu ,Wansheng Kang , Ruixuan Li, Kinchoong Yow, Cheng-Zhong Xu " Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud" IEEE transactions,Vol 30,Issue 5,2012.
Jun Xu ,Weiming Zhang , Ce Yang Jiajia Xu , Nenghai Yu "Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data" IEEE transactions,Vol 13,Issue 6,Nov 2012.
P.A. Cabarcos, F.A. Mendoza, R.S. Guerrero, A.M Lopez, and D. Diaz- Sanchez,” SuSSo: seamless and ubiquitous single sign-on for cloud service" IEEE transactions, Vol11, Issue 7, Dec 2011.
Q. Chai, and G. Gong, “Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers” IEEE transactions, Vol 12,Issue 9,Oct 2013.
ZhirongShen,Jiwu Shu,Wei Xue "Preferred keyword search over encrypted data in cloud computing" IEEE transactions,Vol 1,Issue 8,Nov 2013.
Orencik C, Kantarcioglu M, Savas E. "A Practical and Secure Multi-keyword Search Method over Encrypted Cloud Data" IEEE transactions, Vol 4, Issue 7, Jan 2012.
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,” Proc. IEEE INFOCOM, Mar. 2010.
T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,” Proc. 31st Int’l Conf. Distributed Computing Systems (ICDCS’10), pp. 383392, June 2011.
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th International Conf. Distributed Computing Systems (ICDCS ’10), 2010.
L. Ballard, S. Kamara, and F. Monrose, “Achieving Efficient Conjunctive Keyword Searches over Encrypted Data,” Proc. Seventh International Conf. Information and Comm. Security (ICICS ’05), 2005.
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous Ibe, and Extensions,” J. Cryptology, vol. 21, no. 3, pp. 350391, 2008.
Refbacks
- There are currently no refbacks.