Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity
Abstract
Keywords
Full Text:
PDFReferences
Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data,Cong Wang,Student Member ,IEEE, Ning Cao, Student Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou,Senior Member, IEEE, VOL. 23, NO. 8, AUGUST 2012
C. Wang, N.cao,j.Li,k.Ren, and W.lou, ”Secure Ranked Keyword Search Over Encrypted Cloud Data,”proc .IEEE 30thInt‟l Conf. Distributed Computing Syystems (ICDCS‟10), 2010.
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W.Lou, “Fuzzy Keyword Search over Encrypted Data in Cloud Computing,”Proc IEEE INFOCOM‟10, 2010.
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc .IEEE INFOCOM ‟11, 2011.
A. Boldyreva, N. Chenette, Y. Lee, and A. O‟Neill, “Order-Preserving Symmetric Encryption,” Proc. Int‟l Conf. Advances in Cryptology (Eurocrypt ‟09), 2009.
K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol 16, no. 1, pp. 69-73, 2012.
C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012.
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22,no. 5, pp. 847-859, May 2011
RFC “Request for Comments Database,” http://www.ietf.org/rfc.html, 2012.
M.C. Mont, S. Pearson, and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services,” Proc. Int‟l Workshop Database and Expert Systems Applications (DEXA), pp. 377-382, 2003. S. Oaks, Java Security. O‟Really, 2001.
P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,”Proc. ACM Conf. Computer and Comm. Security (CCS‟06), 2006.
Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing,” http://www.cloudsecurityalliance. org, 2009.
P. Mell and T. Grance, “Draft Nist Working Definition of Cloud Computing,”http://csrc.nist.gov/groups/SNS/cloudcomputing/index.htm, Jan. 2010.
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,”Technical Report UCB-EECS-2009-28, Univ. of California,Berkeley, Feb. 2009.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.