Computer Science ›› 2018, Vol. 45 ›› Issue (5): 123-130.doi: 10.11896/j.issn.1002-137X.2018.05.021
Previous Articles Next Articles
YAO Han-bing, XING Na-na, ZHOU Jun-wei and LI Yong-hua
[1] LI H,SUN W H,LI F H,et al.Secure and Privacy-Preserving Data Storage Service in Public Cloud[J].Journal of Computer Research and Development,2014,1(7):1397-1409.(in Chinese) 李晖,孙文海,李凤华,等.公共云存储服务数据安全及隐私保护技术综述[J].计算机研究与发展,2014,51(7):1397-1409. [2] FENG D G,ZHANG M,ZHANG Y,et al.Study on Cloud Computing Security[J].Journal of Software,2011,22(1):71-83.((in Chinese) 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,2(1):71-83. [3] SONG D X,WAGNER D,PERRIG A.Practical Techniques for Searches on Encrypted Data[C]∥IEEE Symposium on Security &Privacy.2002:44-55. [4] GOH E J.Secure Indexes.http://eprint.iacr.org/2003/216. [5] DAN B,CRESCENZO G D,OSTROVSKY R,et al.Public Key Encryption with Keyword Search[M]∥Advances in Cryptology-EUROCRYPT 2004.Springer Berlin Heidelberg,2004:506-522. [6] WANG C,CAO N,LI J,et al.Secure Ranked Keyword Search over Encrypted Cloud Data[C]∥IEEE International Conference on Distributed Computing Systems.IEEE,2010:253-262. [7] CAO N,WANG C,LI M,et al.Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(1):222-233. [8] XU Z,KANG W,LI R,et al.Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud[C]∥IEEE International Conference on Parallel and Distributed Systems.IEEE,2012:244-251. [9] SUN W,WANG B,CAO N,et al.Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ran-king[C]∥ACM Symposium on Information,Computer and Communications Security.2013:71-82. [10] FU Z,SUN X,XIA Z,et al.Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing[C]∥IEEE International PERFORMANCE Computing and Communications Conference.IEEE,2013:1-8. [11] CHEN C,ZHU X,SHEN P,et al.An Efficient Privacy-Preserving Ranked Keyword Search Method[J].IEEE Transactions on Parallel & Distributed Systems,2016,7(4):951-963. [12] ZERR S,OLMEDILLA D,NEJDL W,et al.Zerber +R:top-k retrieval from a confidential index[C]∥Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology.ACM,2009:439-449. [13] CUTTING D,PEDERSEN J.Optimization for dynamic inverted index maintenance[J].International Acm Sigir Conference on Research & Development in Information Retrieval.1989:405-411. [14] ZOBEL J,MOFFAT A,RAMAMOHANARAO K.Invertedfiles versus signature files for text indexing[J].ACM Transactions on Database Systems,1998,23(4):453-490. [15] ZOBEL J,MOFFAT A.Inverted files for text search engines[J].ACM Computing Surveys,2006,38(2):1-56. [16] MANWAR B,MAHALLE S,CHINCHKHEDE D,et al.AVector Space Model for Information Retrieval:A Matlab A pproach[J].Indian Journal of Computer Science & Engineering,2012,3(2):222-229. [17] WANG C,CAO N,REN K,et al.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data[J].IEEE Transactions on Parallel & Distributed Systems,2012,23(23):1467-1479. [18] AGRAWAL R,KIERNAN J,SRIKANT R,et al.Order preserving encryption for numeric data[C]∥ACM SIGMOD International Conference on Management of Data.ACM,2004:563-574. [19] BOLDYREVA A,CHENETTE N,LEE Y,et al.Order-Preserving Symmetric Encryption[M]∥Advances in Cryptology-EUROCRYPT 2009.Cologne,Germany,2009:224-241. [20] LESTER N,ZOBEL J,WILLIAMS H E.In-Place versus Re-Build versus Re-Merge:Index Maintenance Strategies for Text Retrieval Systems[C]∥27th Australasian Computer Science Conference.2004:15-22. [21] BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426. [22] BONOMI F,MITZENMACHER M,PANIGRAHY R,et al.An Improved Construction for Counting Bloom Filters[C]∥Con-ference on European Symposium.Zurich,Switzerland,2006:684-695. [23] YONG H H,LEE P J.Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System[C]∥International Conference on Pairing-Based Cryptography.Springer-Verlag,2007:2-22. [24] LEWKO A,OKAMOTO T,SAHAI A,et al.Fully secure functional encryption:attribute-based encryption and(hierarchical) inner product encryption[M]∥Advances in Cryptology-EUROCRYPT 2010.French Riviera,2010:62-91. [25] BALLARD L,KAMARA S,MONROSE F.Achieving Efficient Conjunctive Keyword Searches over Encrypted Data[C]∥ International Conference on Information and Communications Security(ICICS 2005).Beijing,China,2005:414-426. [26] WANG S,SHAN P.Security analysis of a one-way hash function based on spatio temporal chaos[J].Chinese Physics B,2011,20(9):79-85. [27] BOLDYREVA A,CHENETTE N,LEE Y,et al.Order-Preserving Symmetric Encryption[M]∥Advances in Cryptology-EUROCRYPT 2009.Cologne,Germany,2009:224-241. |
No related articles found! |
|