Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 6
Page No. 392 - 398

Secure Hybrid Search in Encrypted Cloud Data

Authors : D. Palanivel Rajan, S. John Alexis and S. Pravinth Raja

References

Buyya, R., C.S. Yeo and S. Venugopal, 2008. Market-Oriented cloud computing: Vision, Hype and reality for delivering IT services as computing utilities. Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, September 26-28, 2008, Houston, USA., pp: 5-13.

Cao, N., C. Wang, M. Li, K. Ren and W. Lou, 2011. Privacy-preserving multi-keyword ranked search over encrypted cloud data. Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, April 10-15, 2011, Shanghai, China, pp: 829-837.

Cao, N., C. Wang, M. Li, K. Ren and W. Lou, 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE. Transac. parallel Distrib. Syst., 25: 222-233.
CrossRef  |  Direct Link  |  

Chang, Y.C. and M. Mitzenmacher, 2005. Privacy preserving keyword searches on remote encrypted data. Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, June 7-10, 2005, New York, USA., pp: 442-455.

Chase, M. and S. Kamara, 2010. Structured encryption and controlled disclosure. Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, December 5-9, 2010, Springer, Berlin, Germany, pp: 577-594.

Curtmola, R., J.A. Garay, S. Kamara and R. Ostrovsky, 2006. Searchable symmetric encryption: Improved definitions and efficient constructions. Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, Alexandria, USA., pp: 79 -88.

Deepa, P.L., S.V. Kumar and D.S. Karthik, 2012. Searching techniques in encrypted cloud data. Intl. J. Adv. Res. Comput. Eng. Technol. IJARCET., 1: 1-5.
Direct Link  |  

Fu, Z., X. Sun, N. Linge and L. Zhou, 2014. Achieving effective cloud search services: Multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE. Trans. Consum. Electron., 60: 164-172.
CrossRef  |  Direct Link  |  

Hu, C. and P. Liu, 2013. Public key encryption with ranked multi-keyword search. Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), September 9-11, 2013, IEEE, Xi'an, China, ISBN:978-0-7695-4988-0, pp: 109-113.

Li, J., Q. Wang, C. Wang, N. Cao, K. Ren and W. Lou, 2010. Fuzzy keyword search over encrypted data in cloud computing. Proceedings of the 9th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, March 15-19, 2010, San Diego, CA., USA., pp: 1-5.

Liu, H., 2010. A new form of DOS attack in a cloud and its avoidance mechanism. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, October 08-08, 2010, ACM, Chicago, Illinois, USA., ISBN:978-1-4503-0089-6, pp: 65-76.

Matwyshyn, A.M., A. Cui, A.D. Keromytis and S.J. Stolfo, 2010. Ethics in security vulnerability research. IEEE. Secur. Privacy, 8: 67-72.
CrossRef  |  Direct Link  |  

Mell, P. and T. Grance, 2010. Draft NIST working deļ¬nition of cloud com-puttin. National Institute of Standards and Technology, Gaithersburg, Maryland, USA. http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.

Narudkar, A. and A.J. Aparna, 2015. Survey on searching techniques over encrypted data. IJCSIT. Intl. J. Comput. Sci. Inf. Technol., 6: 1007-1010.
Direct Link  |  

Petrov, V., M. Komar and Y. Koucheryavy, 2013. A lightweight many-to-many authentication protocol for near field communications. Proceedings of the 2013 21st IEEE International Conference on Network Protocols (ICNP), October 7-10, 2013, IEEE, Goettingen, Germany, ISBN:978-1-4799-1270-4, pp: 1-2.

Shetty, S., N. Luna and K. Xiong, 2012. Assessing network path vulnerabilities for secure cloud computing. Proceedings of the 2012 IEEE International Conference on Communications (ICC), June 10-15, 2012, IEEE, Ottawa, Canada, ISBN:978-1-4577-2052-9, pp: 5548-5552.

Song, D., D. Wagner and A. Perrig, 2000. Practical techniques for searches on encrypted data. Proceeding of the IEEE Symposium on Security and Privacy, May 14-17, 2000, Berkeley, CA., USA., pp: 44-55.

Venugopal, S., X. Chu and R. Buyya, 2008. A negotiation mechanism for advance resource reservations using the alternate offers protocol. Proceedings of the 16th International Workshop on Quality of Service IWQoS, June 2-4, 2008, IEEE, Enschede, Netherlands, pp: 40-49.

Wang, C., N. Cao, J. Li, K. Ren and W. Lou, 2010. Secure ranked keyword search over encrypted cloud data. Proceedings of the IEEE 30th International Conference on Distributed Computing Systems, June 21-25, 2010, Genoa, Italy, pp: 253-262.

Wang, J.A., H. Wang, M. Guo, L. Zhou and J. Camargo, 2010. Ranking attacks based on vulnerability analysis. Proceedings of the 2010 43rd Hawaii International Conference on System Sciences (HICSS), January 5-8, 2010, IEEE, Honolulu, Hawaii, USA., ISBN:978-1-4244-5509-6, pp: 1-10.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved