Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 23
Page No. 4763 - 4769

Dynamic Searchable Encryption over Ditributed Cloud Storage

Authors : K. Swetha and M.R. Narasinga Rao

References

Boldi, P., F. Bonchi, C. Castillo, D. Donato, A. Gionis and S. Vigna, 2008. The query-flow graph: Model and applications. Proceedings of the 17th ACM Conference on Information and Knowledge Management, October 26-30, 2008, California, pp: 609-618.

Cao, N., C. Wang, M. Li, K. Ren and W. Lou, 2014. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE. Transac. parallel Distrib. Syst., 25: 222-233.
CrossRef  |  Direct Link  |  

Curtmola, R., J. Garay, S. Kamara and R. Ostrovsky, 2011. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur., 19: 895-934.
CrossRef  |  Direct Link  |  

Jeeva, M.B. and S. Rajalakshmi, 2014. Towards secure multi-keyword ranked search over encrypted cloud data. Intl. J. Eng. Technol. Sci., 1: 188-193.

Jones, R. and K.L. Klinkner, 2008. Beyond the session timeout: Automatic hierarchical segmentation of search topics in query logs. Proceedings of the 17th ACM Conference on Information and Knowledge Management, October 26-30, 2008, ACM, New Tork, USA., ISBN: 978-1-59593-991-3, pp: 699-708.

Katz, J., A. Sahai and B. Waters, 2008. Predicate Encryption Supporting Disjunctions, Polynomial Equations and Inner Products. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Smart, N. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-78967-3, pp: 146-162.

Li, J., Q. Wang, C. Wang, N. Cao, K. Ren and W. Lou, 2010. Fuzzy keyword search over encrypted data in cloud computing. Proceedings of the 9th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, March 15-19, 2010, San Diego, CA., USA., pp: 1-5.

Lohr, H., A.R. Sadeghi and M. Winandy, 2010. Securing the e-health cloud. Proceedings of the 1st ACM International Health Informatics Symposium, November 11-12, 2010, Arlington, VA., USA., pp: 220-229.

Naveed, M., M. Prabhakaran and C.A. Gunter, 2014. Dynamic searchable encryption via blind storage. Proceedings of the 2014 IEEE Symposium on Security and Privacy, May 18-21, 2014, IEEE, New York, USA., ISBN: 978-1-4799-4686-0, pp: 639-654.

Sadikov, E., J. Madhavan, L. Wang and A. Halevy, 2010. Clustering query refinements by user intent. Proceedings of the 19th International Conference on World Wide Web, April 26-30, 2010, Raleigh, NC., USA., pp: 841-850.

Shen, E., E. Shi and B. Waters, 2009. Predicate Privacy in Encryption Systems. In: Theory of Cryptography Conference. Reingold, O. (Ed.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-642-00457-5, pp: 457-473.

Song, D., D. Wagner and A. Perrig, 2000. Practical techniques for searches on encrypted data. Proceeding of the IEEE Symposium on Security and Privacy, May 14-17, 2000, Berkeley, CA., USA., pp: 44-55.

Spink, A., M. Park, B.J. Jansen and J. Pedersen, 2006. Multitasking during web search sessions. Inf. Process. Manage., 42: 264-275.
Direct Link  |  

Wang, C., N. Cao, J. Li, K. Ren and W. Lou, 2010. Secure ranked keyword search over encrypted cloud data. Proceedings of the IEEE 30th International Conference on Distributed Computing Systems, June 21-25, 2010, Genoa, Italy, pp: 253-262.

Yi, J. and F. Maghoul, 2009. Query clustering using click-through graph. Proceedings of the 18th International Conference on World Wide Web, April 20-24, 2009, ACM, New York, USA., ISBN: 978-1-60558-487-4, pp: 1055-1056.

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved