[1] |
ARMBRUST M , FOX A , GRIFFITH R . Above the clouds: a berkeley view of cloud computing[EB/OL]. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html, 2009.
|
[2] |
BUGIEL S , NURNBERGER S , SADEGHI A . Twin clouds: an archi-tecture for secure cloud computing[A]. Workshop on Cryptography and Security in Clouds[C]. Zurich, Switzerland, 2011. 1-11.
|
[3] |
KAMARA S , LAUTER K . Cryptographic cloud storage[J]. Fi ial Cryptogra phy and Data Security, 2010,6054:136-149.
|
[4] |
LI J , KROHN M , MAZI D . Secure untrusted data repositor (SUNDR)[A]. Proceedings of the 6th Symposium on Operat ng Sys-tems Design and Implementation[C]. San Francisco, CA, USA, 2004. 91-106.
|
[5] |
GOH E J . Secure indexes[A]. Proceedings of the 2004 Workshop on Information Security Applications[C]. Jeju Island , Korea, 2004. 73-86.
|
[6] |
SONG D X , WAGNER D , PERRIG A . Practical techniques or searches on encrypted data[A]. Proceedings of the IEEE Symposium on Security and Privacy[C]. CA,USA, 2000. 36-49.
|
[7] |
BONEH D , CRESCENZO G D , OSTROVSKY R . Public key encryp-tion with keyword search[A]. Proc of EUROCRYP'04[C]. Interlaken, Switzerland, 2004. 506-522.
|
[8] |
PAILLIER P . Public-key cryptosystems based on composite degree resi-duosity classes[A]. Public-key cryptosystems based on composite degree resi-duosity classes[A]. Proceedings of the International Conference on the Theory and Applications of Cryptograhic Techniques (EURO-CRYPT'99)[C]. Prague, Czech Republic, 1999. 223-238.
|
[9] |
BETHENCOURT J , SONG D , WATERS B . New constructions and practical applications for private stream searching (extended ab-stract)[A]. Proceedings of the IEEE Symposium on Security and Pri-vacy (SP'06)[C]. Oakland, California, USA, 2006. 134-139.
|
[10] |
BETHENCOURT J , SONG D , WATERS B . New techniques for private stream searching[J]. ACM Transactions on Infor ion and System Security, 2009,12(3):1-32.
|
[11] |
HACIGUMUS H , LYER B , MEHROTRA S . Providing database as a service[A]. Proceedings of the International Conference on Data En-gineering(ICDE 2002)[C]. SAN JOSE, CA, USA, 2002. 29-38.
|
[12] |
HACIGUMUS H , LYER B , LI C . Executing SQL over encrypted data in the database-server-provider model[A]. Proceedings of ACM SIGMOD[C]. Madison, Wisconsin, USA, 2002. 216-227.
|
[13] |
HACIGUMUS H , LYER B , LI C . Efficient executing of aggre ion queries over encrypted relational database[A]. Proceed ngs of Data-base Systems for Advanced Applications(DASFAA 2004)[C]. Jeju Island, Korea, 2004. 125-136.
|
[14] |
HACIGUMUS H , LYER B , LI C . Query optimization in encrypted database system[A]. Proceedings of Database Systems for Advanced Applications(DASFAA 2005)[C]. Beijing, China, 2005. 216-227.
|
[15] |
HORE B , MEHROTRA S , TSUDIK G . A privacy-index for range queries[A]. Proceedings of the 30th VLDB Conference[C]. Toronto, Canada, 2004. 223-235.
|
[16] |
王迪, 刘国华, 于醒兵 . 基于最佳桶划分策略的密文索引技术[J]. 小型微型计算机系统, 2008,29(4):649-652. WANG D , LIU G H , YU X B . Cryptograph index technology based on strategy of optimal bucket partitioning[J]. Journal of Chinese Computer Systems, 2008,29(4):649-652.
|
[17] |
AGRAWAL R , KIERNAN J , SRIKANT R . Order preserving en-cryption for numericdata[A]. SIGMOD2004[C]. 2004. 13-18.
|
[18] |
BLOOM B . Space/time trade-offs in hash coding with allowable er-rors[J]. Communications of the ACM, 1970,13(7):422-426.
|
[19] |
CHANG Y C , MITZENMACHER M . Privacy preserving keyword searches on remote encrypted data[J]. Applied Cryptography and Net-work Security Lecture Notes in Computer Science, 2005,3531:442-455.
|
[20] |
BONEH D , KUSHILEVITZ E , OSTROVSKY R . Public-key encryp-tion that allows PIR queries[A]. 27th Annual International Cryptology Conference[C]. Santa Barbara, CA, USA, 2007. 50-67.
|
[21] |
CURTMOLA R , GARAY J , KAMARA S . Searchable symmetric encryption: improved definitions and efficient constructions[A]. Pro-ceedings of ACM Conference on Computer and Communications Se-curity (CCS)[C]. Alexandria, VA, USA, 1997. 79-88.
|
[22] |
CHASE M , KAMARA S . Structured encryption and controlled dis-closure[A]. Proceedings of Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2010)[C]. Sin-gapore, 2010. 577-594.
|
[23] |
KUROSAWA K , OHTAKI Y . UC-secure searchable symmetric en-cryption[A]. Proceedings of Financial Cryptography and Data Securi-ty(FC)[C]. Bonaire, Dutch Caribbean, 2012. 285-298.
|
[24] |
LISEDONK V P , SEDGHI S , DOUMEN J . Computationally effic nt searchable symmetric encryption[A]. Proceedings of Workshop on Secure Data Management(SDM)[C]. Singapore, 2010. 87-100.
|
[25] |
KAMARA S , PAPAMANTHOU C , ROEDER T . ROEDER T. Dynamic searchable symmetric encryption[A]. Proceedings of the 2012 ACM conference on Computer and Communications Security (CCS '12)[C]. New York, NY, USA, 2012. 965-976.
|
[26] |
BALLARD L , KAMARA S , MONROSE F . Achieving efficient con-junctive keyword searches over encrypted data[A]. Proc of ICICS[C]. Beijing, China, 2005. 414-426.
|
[27] |
BONEH D , WATERS B . Conjunctive, subset, and range quer es on encrypted data[A]. Proc of TCC[C]. Amsterdam, The Netherlands, 2007. 535-554.
|
[28] |
BRINKMAN R , DOUMEN J , JONKER W . Using secret sharing for searching in encrypted data[J]. Secure Data Management, 2014,3718:18-27.
|
[29] |
BRINKMAN R . Searching in Encrypted Data[D]. University of Twente, the Netherlands, 2007.
|
[30] |
GOLLE P , STADDON J , WATERS B . Secure conjunctive keyword search over encrypted data[A]. Proc of ACNS[C]. Yellow Mountain, China, 2004. 31-45.
|
[31] |
HWANG Y H , LEE P J . Public key encryption with conjunctive key-word search and its extension to a multi-user system[A]. First Interna-tional Conference[C]. Tokyo, Japan, 2007. 2-22.
|
[32] |
KATZ J , SAHAI A , WATER B . Predicate encryption supporting dis-junctions, polynomial equations, and inner products[A]. Proc of EU-ROCRYPT[C]. Istanbul, Turkey, 2008. 146-162.
|
[33] |
WANG C , CAO N , REN K . Enabling secure and efficient ranked keyword search over outsourced cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(8):1467-1479.
|
[34] |
WANG C , CAO N , LI J . Secure ranked keyword search over en-crypted cloud data[A]. Proceedings of ICDCS[C]. Genova, Italy, 2010. 253-262.
|
[35] |
CAO N , WANG C , LI M . Privacy-preserving multi-keyword ranked search over encrypted cloud data[A]. IEEE INFOCOM[C]. hai, China, 2011. 829-837.
|
[36] |
DAMIANI E , FORESTI S . Key management for multi-user encrypted databases[A]. Proc of ACM[C]. Virginia, USA, 2005. 22-34.
|
[37] |
POPA R A , ZELDOVICH N , BALAKRISHNAN H . CryptDB: A Practical Encrypted Relational DBMS[R]. MIT-CSAIL-TR-2011-005, Computer Science and Artificial Intelligence Laborator, Cambridge, MA, 2011.
|
[38] |
GENTRY C . Fully homomorphic encryption using ideal lattices[A]. STOC'09[C]. Bethesda, Maryland, USA, 2009. 169-178.
|
[39] |
KAMARA S , PAPAMANTHOU C , ROEDER T . CS2: A Searchable Cryptographic Cloud Storage System[R]. MSR-TR-2011-58, 2011.
|
[40] |
CURTMOLA R , GARAY J , KAMARA S . Searchable symmetric encryption: improved definitions and efficient constructions[J]. Jour-nal of Computer Security, 2011,19(5):895-934.
|
[41] |
FERREIRA B , DOMINGOS H . Management and search of private data on storage clouds[A]. Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management (SDMCMM'12)[C]. Montreal, Quebec, Canada, 2012.
|