[1] |
Cloud Security Alliance,Top Threats Working Group. CSA’s cloud computing top threats in 2016[R]. 2016.
|
[2] |
It’s all about identity theft - first half findings from the 2016 breach level index[R]. 2016.
|
[3] |
王国峰, 刘川意, 潘鹤中 ,等. 云计算模式内部威胁综述[J]. 计算机学报, 2017,40(2): 296-316.
|
|
WANG G F , LIU C Y , PAN H Z ,et al. Survey on insider threats to cloud computing[J]. Chinese Journal of Computers, 2017,40(2): 296-316.
|
[4] |
GOLDREICH O , OSTROVSKY R . Software protection and simulation on oblivious RAMs[J]. Journal of the ACM, 1996,43(3): 431-473.
|
[5] |
B?SCH C , HARTEL P , JONKER W ,et al. A survey of provably secure searchable encryption[J]. ACM Computing Surveys (CSUR), 2015,47(2):18.
|
[6] |
Gartner report:how to evaluate and operate a cloud access security broker[R]. 2015.
|
[7] |
SCHüTZE H , . Introduction to information retrieval[C]// International Communication of Association for Computing Machinery Conference. 2008.
|
[8] |
HE W , AKHAWE D , JAIN S ,et al. Shadowcrypt:encrypted Web applications for everyone[C]// The 2014 ACM SIGSAC Conference on Computer and Communications Security. 2014: 1028-1039.
|
[9] |
LAU B , CHUNG S , SONG C ,et al. Mimesis aegis:a mimicry privacy shield–a system’s approach to data privacy on public cloud[C]// 23rd USENIX Security Symposium (USENIX Security 14). 2014: 33-48.
|
[10] |
POPA R A , STARK E , VALDEZ S ,et al. Building Web applications on top of encrypted data using Mylar[C]// 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 2014: 157-172.
|
[11] |
POPA R A , REDFIELD C , ZELDOVICH N ,et al. CryptDB:protecting confidentiality with encrypted query processing[C]// The Twenty-Third ACM Symposium on Operating Systems Principles. 2011: 85-100.
|
[12] |
SONG D X , WAGNER D , PERRIG A . Practical techniques for searches on encrypted data[C]// 2000 IEEE Symposium on Security and Privacy. 2000: 44-55.
|
[13] |
GOH E J . Secure indexes[J]. International Association for Cryptologic Research Cryptology ePrint Archive, 2003:216.
|
[14] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[15] |
XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(2): 340-352.
|
[16] |
LI J , WANG Q , WANG C ,et al. Fuzzy keyword search over encrypted data in cloud computing[C]// INFOCOM. 2010: 1-5.
|
[17] |
KAMARA S , PAPAMANTHOU C , ROEDER T . Dynamic searchable symmetric encryption[C]// The 2012 ACM Conference on Computer and Communications Security. 2012: 965-976.
|
[18] |
BONEH D , CRESCENZO G D , OSTROVSKY R ,et al. Public key encryption with keyword search[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2004: 506-522.
|
[19] |
LIU Q , WANG G , WU J . Secure and privacy preserving keyword searching for cloud storage services[J]. Journal of Network and Computer Applications, 2012,35(3): 927-933.
|
[20] |
GENTRY C , . Certificate-based encryption and the certificate revocation problem[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2003: 272-293.
|
[21] |
MICALI S , . Scalable certificate validation and simplified pki management[C]// 1st Annual PKI Research Workshop. 2002:15.
|
[22] |
SHAMIR A , . Identity-based cryptosystems and signature schemes[C]// Workshop on the Theory and Application of Cryptographic Techniques. 1984: 47-53.
|
[23] |
BONEH D , FRANKLIN M . Identity-based encryption from the Weil pairing[C]// Annual International Cryptology Conference. 2001: 213-229.
|
[24] |
AL-RIYAMI S S , PATERSON K G . Certificateless public key cryptography[C]// International Conference on the Theory and Application of Cryptology and Information Security. 2003: 452-473.
|
[25] |
LEWKO A , WATERS B . Decentralizing attribute-based encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2011: 568-588.
|
[26] |
SCHULZ K U , MIHOV S . Fast string correction with Levenshtein automata[J]. International Journal on Document Analysis and Recognition, 2002,5(1): 67-85.
|
[27] |
ISLAM M S , KUZU M , KANTARCIOGLU M . Access pattern disclosure on searchable encryption:ramification,attack and mitigation[C]// NDSS. 2012:12.
|
[28] |
CASH D , GRUBBS P , PERRY J ,et al. Leakage-abuse attacks against searchable encryption[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 668-679.
|