Preferred search over encrypted data (original) (raw)

References

  1. Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53(4): 50–58
    Article Google Scholar
  2. Ren Y J, Shen J, Wang J, Han J, Lee S Y. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 2015, 16(2): 317–323
    Google Scholar
  3. Ma T H, Zhou J J, Tang M L, Tian Y, Dhelaan A, Rodhaan A, Lee S Y. Social network and tag sources based augmenting collaborative recommender system. IEICE transactions on Information and Systems, 2015, E98–D(4): 902–910
    Article Google Scholar
  4. Shu J W, Shen Z R, Xue W. Shield: a stackable secure storage system for file sharing in public storage. Journal of Parallel and Distributed Computing, 2014, 74(9): 2872–2883
    Article Google Scholar
  5. Shu J W, Shen Z R, Xue W, Fu Y X. Secure storage system and key technologies. In: Proceedings of Asia and South Pacific Design Automation Conference. 2013, 376–383
    Google Scholar
  6. Cai K, Hong C, Zhang M, Feng D G, Lv Z Q. A secure conjunctive keywords search over encrypted cloud data against inclusion-relation attack. In: Proceedings of IEEE International Conference on Cloud Computing Technology and Science. 2013, 339–346
    Google Scholar
  7. Guo H, Li Z J, Mu Y, Zhang X Y. Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Information Science, 2011, 181(3): 628–647
    Article MathSciNet MATH Google Scholar
  8. Koutrika G, Ioannidis Y. Personalized queries under a generalized preference model. In: Proceedings of International Conference on Data Engineering. 2005, 841–852
    Google Scholar
  9. Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings of IEEE International Conference on Computer Communications. 2011, 829–837
    Google Scholar
  10. Okamoto T, Takashima W. Hierarchical predicate encryption for innerproducts. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2009, 241–237
    Google Scholar
  11. Wong W K, Cheung D W, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of ACM SIGMOD International Conference on Management of Data. 2009, 139–152
    Chapter Google Scholar
  12. Yu S C, Wang C, Ren K, Lou W J. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE International Conference on Computer Communications. 2010, 534–542
    Google Scholar
  13. LiM, Yu S C, Cao N, Lou WJ. Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 383–392
    Google Scholar
  14. Pervez Z, Awan A, Khattak A, Lee S, Huh E. Privacy-aware searching with oblivious term matching for cloud storage. The Journal of Supercomputing, 2013, 63(2): 538–560.
    Article Google Scholar
  15. Cao N, Yang Z Y, Wang C, Lou W J. Privacy-preserving query over encrypted graph-structured data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2011, 393–402
    Google Scholar
  16. Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2004, 506–522
    Google Scholar
  17. Lu Y. Privacy-preserving logarithmic-time search on encrypted data in cloud. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium. 2012
    Google Scholar
  18. Wang C, Cao N, Li J, Ren K, Lou W J. Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 253–262
    Google Scholar
  19. Witten I, Moffat A, Bell T. Managing Gigabytes: Compressing and Indexing Documents and Images. San Mateo, CA: Morgan Kaufmann Publishers, 1999
    MATH Google Scholar
  20. Yan T W, Garcia-Molina H. Sift: a tool for wide-area information dissemination. In: Proceedings of USENIX Annual Technical Conference. 1995, 16–20
    Google Scholar
  21. Liu WY, Chen Z, Lin F, Zhang H J, Ma WY. Ubiquitous media agents: a framework for managing personally accumulated multimedia files. Multimedia Systems, 2003, 9(2): 144–156
    Article Google Scholar
  22. Good N, Schafer J, Konstan J, Borchers A, Sarway B, Herlocker J, Biedl J. Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the 16th National Conference on Artificial Intelligence and 11th Conference on Innovative Applications of Artificial Intelligence. 1999, 439–446
    Google Scholar
  23. Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2008, 146–162
    Google Scholar
  24. Yang X, Liu L, Global I. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. Hershey, PA: Business Science Reference, 2013
    Book Google Scholar
  25. Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the International Conference on Applied Cryptography and Network Security. 2004, 31–45
    Chapter Google Scholar
  26. Shi E, Bethencourt J, Chan H, Song D, Perrig A. Multi-dimensional range query over encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2007, 350–364
    Google Scholar
  27. Stefanidis K, Drosou M, Pitoura E. PerK: personalized keyword search in relational databases through preferences. In: Proceedings of International Conference on Extending Database Technology. 2010, 585–596
    Chapter Google Scholar
  28. Leubner A, Kiessling W. Personalized keyword search with partialorder preferences. In: Proceedings of Brazilian Symposium on Databases. 2002, 181–193
    Google Scholar
  29. Chomicki J. Preference formulas in relational queries. ACM Transaction on Database Systems, 2003, 28(4): 427–466
    Article MathSciNet Google Scholar
  30. Kiessling W. Foundations of preferences in database systems. In: Proceedings of International Conference on Very Large Data Bases. 2002, 311–322
    Chapter Google Scholar
  31. Georgiadis P, Kapantaidakis I, Christophides V, Nguer E, Spyratos N. Efficient rewriting algorithms for preference queries. In: Proceedings of International Conference on Data Engineering. 2008, 1101–1110
    Google Scholar
  32. Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy. 2000, 44–55
    Google Scholar
  33. Goh E J. Secure indexes. IACR Cryptology ePrint Archive, 2003
    Google Scholar
  34. Bloom B. Spacetime trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422–426
    Article MATH Google Scholar
  35. Waters B, Balfanz D, Durfee G, Smetters D. Building an encrypted and searchable audit log. In: Proceedings of Network and Distributed System Security Symposium. 2004
    Google Scholar
  36. Wang C, Cao N, Ren K, Lou WJ. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8): 1467–1479
    Article Google Scholar
  37. Wang C, Ren K, Yu S C, Urs K. Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2012, 451–459
    Google Scholar
  38. Li J, Wang Q, Wang C, Cao N, Ren K, Lou WJ. Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE International Conference on Distributed Computing Systems. 2010, 441–445
    Google Scholar
  39. Sun W H, Wang B, Cao N, Li M, Lou W J, Hou Y, Li H. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of ACM Symposium on Information, Computer and Communications Security. 2013, 71–82
    Google Scholar
  40. Shen Z R, Shu J W, Xue W. Keyword search with access control over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2014, 87–92
    Google Scholar
  41. Shen Z R, Shu J W, Xue W. Preferred keyword search over encrypted data in cloud computing. In: Proceedings of International Symposium of Quality of Service. 2013, 207–212
    Google Scholar
  42. Li J W, Li J, Chen X F, Jia C F, Liu Z L. Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Proceedings of International Conference on Network and System Security. 2012, 490–502
    Chapter Google Scholar
  43. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security. 2006, 89–98
    Google Scholar
  44. Fu Z J, Wu X L, Guan C W, Sun X M, Ren K. Towards efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2706–2716
    Article Google Scholar
  45. Xia Z H, Wang X H, Sun X M, Wang Q. A secure and dynamic multikeyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(2): 340–352
    Article Google Scholar
  46. Fu Z J, Ren K, Shu J G, Sun X M, Huang F X. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(9): 2546–2559
    Article Google Scholar
  47. Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 2015, E98–B(1): 190–200
    Article Google Scholar

Download references