[1] |
WANG N , FU J , BHARGAVA B ,et al. Efficient retrieval over documents encrypted by attributes in cloud computing[J]. IEEE Transactions on Information Forensics and Security, 2018,13(10): 2653-2667.
|
[2] |
HASHEM I A T , YAQOOB I , ANUAR N B ,et al. The rise of “big data” on cloud computing:review and open research issues[J]. Information Systems, 2015,47: 98-115.
|
[3] |
张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21.
|
|
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21.
|
[4] |
贾维嘉, 周小杰 . 雾计算的概念、相关研究与应用[J]. 通信学报, 2018,39(5): 153-165.
|
|
JIA W J , ZHOU X J . Concepts,issues,and applications of fog computing[J]. Journal on Communications, 2018,39(5): 153-165.
|
[5] |
SATYANARAYANAN M . The emergence of edge computing[J]. Computer, 2017,50(1): 30-39.
|
[6] |
ROMAN R , LOPEZ J , MAMBO M . Mobile edge computing,fog et al.:a survey and analysis of security threats and challenges[J]. Future Generation Computer Systems, 2018,78: 680-698.
|
[7] |
FAN K , YIN J , ZHANG K ,et al. EARS-DM:efficient auto correction retrieval scheme for data management in edge computing[J]. Sensors, 2018,18(11):3616.
|
[8] |
MIAO Y , MA J , LIU X ,et al. Lightweight fine-grained search over encrypted data in fog computing[J]. IEEE Transactions on Services Computing, 2018,12(5): 772-785.
|
[9] |
WANG N , FU J , LI J ,et al. Source-location privacy protection based on anonymity cloud in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2019,15(1): 100-114.
|
[10] |
WANG C , WANG Q , REN K ,et al. Privacy-preserving public auditing for data storage security in cloud computing[C]// Proceedings of International Conference on Computer Communications. Piscataway:IEEE Press, 2010: 1-9.
|
[11] |
ESPOSITO C , CASTIGLIONE A , POP F ,et al. Challenges of connecting edge and cloud computing:a security and forensic perspective[J]. IEEE Cloud Computing, 2017,4(2): 13-17.
|
[12] |
KHALIL I M , KHREISHAH A , AZEEM M . Cloud computing security:a survey[J]. Computers, 2014,3(1): 1-35.
|
[13] |
SINGH S , JEONG Y S , PARK J H . A survey on cloud computing security:issues,threats,and solutions[J]. Journal of Network and Computer Applications, 2016,75: 200-222.
|
[14] |
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2005: 442-455.
|
[15] |
CURTMOLA R , GARAY J , KAMARA S ,et al. Searchable symmetric encryption:improved definitions and efficient constructions[J]. Journal of Computer Security, 2011,19(5): 895-934.
|
[16] |
WANG C , CAO N , REN K ,et al. Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,23(8): 1467-1479.
|
[17] |
CAO N , WANG C , LI M ,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(1): 222-233.
|
[18] |
WONG W K , CHEUNG D W , KAO B ,et al. Secure kNN computation on encrypted databases[C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York:ACM Press, 2009: 139-152.
|
[19] |
SUN W , WANG B , CAO N ,et al. Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking[C]// Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. New York:ACM Press, 2013: 71-82.
|
[20] |
FU Z , SUN X , LIU Q ,et al. Achieving efficient cloud search services:multi-keyword ranked search over encrypted cloud data supporting parallel computing[J]. IEICE Transactions on Communications, 2015,98(1): 190-200.
|
[21] |
XIA Z , WANG X , SUN X ,et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,27(2): 340-352.
|
[22] |
CHEN C , ZHU X , SHEN P ,et al. An efficient privacy-preserving ranked keyword search method[J]. IEEE Transactions on Parallel and Distributed Systems, 2016,27(4): 951-963.
|
[23] |
WODI B H , LEUNG C K , CUZZOCREA A ,et al. Fast privacy-preserving keyword search on encrypted outsourced data[C]// IEEE International Conference on Big Data. Piscataway:IEEE Press, 2019: 1-10.
|
[24] |
徐光伟, 史春红, 王文涛 ,等. 基于语义扩展的多关键词可搜索加密算法[J]. 计算机研究与发展, 2019,56(10): 2193-2206.
|
|
XU G W , SHI C H , WANG W T ,et al. Multi-keyword searchable encryption algorithm based on semantic extension[J]. Journal of Computer Research and Development, 2019,56(10): 2193-2206.
|
[25] |
CHEN J , HE K , DENG L ,et al. EliMFS:achieving efficient,leakage-resilient,and multi-keyword fuzzy search on encrypted cloud data[J]. IEEE Transactions on Services Computing, 2017,99(99):1.
|
[26] |
ZHONG H , LI Z , XU Y ,et al. Two-stage index-based central keyword-ranked searches over encrypted cloud data[J]. Science China Information Sciences, 2020,63(3): 1-3.
|
[27] |
FU S , ZHANG Q , JIA N ,et al. A privacy-preserving fuzzy search scheme supporting logic query over encrypted cloud data[J]. Mobile Networks and Applications, 2020(4): 1-12.
|
[28] |
GUAN Z , LIU X , WU L ,et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data[J]. Information Sciences, 2020,514: 523-540.
|
[29] |
MU Y , YAO H . Encrypted data retrieval scheme based on bloom filter[C]// Proceedings of the 18th International Symposium on Distributed Computing and Applications for Business Engineering and Science. Piscataway:IEEE Press, 2019: 249-252.
|
[30] |
SALTON G , WONG A , YANG C S . A vector space model for automatic indexing[J]. Communications of the ACM, 1975,18(11): 613-620.
|
[31] |
ZERR S , DEMIDOVA E , OLMEDILLA D ,et al. Zerber:r-confidential indexing for distributed documents[C]// Proceedings of the 11th International Conference on Extending Database Technology:Advances in database technology. New York:ACM Press, 2008: 287-298.
|