[1] |
CHOO K K R , LU R X , CHEN L Q ,et al. A foggy research future:advances and future opportunities in fog computing research[J]. Future Generation Computer Systems, 2018,78(2): 677-679.
|
[2] |
LU R X , HEUNG K , LASHKARI A H ,et al. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT[J]. IEEE Access, 2017,5: 3302-3312.
|
[3] |
LU R , LIANG X H , LI X ,et al. EPPA:an efficient and privacy-preserving aggregation scheme for secure smart grid communications[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,23(9): 1621-1631.
|
[4] |
WANG J , YU X , ZHAO M . Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query[J]. Arabian Journal for Science and Engineering, 2015,40(8): 2375-2388.
|
[5] |
DAI H , YE Q Q , YI X ,et al. VP2RQ:efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2016,12(11): 1-15.
|
[6] |
SHEN Y , HUANG L S , YANG W . Achieving personalized and privacy-preserving range queries over outsourced cloud data[C]// 2017 IEEE International Conference on Communications. Piscataway:IEEE Press, 2017: 1-6.
|
[7] |
LU R . A new communication-efficient privacy-preserving range query scheme in fog-enhanced IoT[J]. IEEE Internet of Things Journal, 2018,6(2): 2497-2505.
|
[8] |
BONEH D , GOH E J , NISSIM K . Evaluating 2-DNF formulas on ciphertexts[C]// Theory of Cryptography Conference. Berlin:Springer, 2005: 325-341.
|
[9] |
PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1999: 223-238.
|
[10] |
ISLAM M S , KUZU M , KANTARCIOGLU M . Inference attack against encrypted range queries on outsourced databases[C]// Proceedings of the 4th ACM conference on Data and application security and privacy. New York:ACM Press, 2014: 235-246.
|
[11] |
NAVEED M , KAMARA S , WRIGHT C V . Inference attacks on property-preserving encrypted databases[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 644-655.
|
[12] |
KELLARIS G , KOLLIOS G , NISSIM K ,et al. Generic attacks on secure outsourced databases[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 1329-1340.
|
[13] |
LACHARITé M S , MINAUD B , PATERSON K G . Improved reconstruction attacks on encrypted data using range query leakage[C]// 2018 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2018: 297-314.
|
[14] |
DE C A , IOVINO V . jPBC:Java pairing based cryptography[C]// 2011 IEEE symposium on computers and communication. Piscataway:IEEE Press, 2011: 850-855.
|
[15] |
HUANG B , LIANG S . A range search scheme based on encrypted index hiding order and access patterns[C]// 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). Piscataway:IEEE Press, 2019: 340-347.
|
[16] |
GUO C , ZHUANG R , JIE Y ,et al. Secure range search over encrypted uncertain IoT outsourced data[J]. IEEE Internet of Things Journal, 2018,6(2): 1520-1529.
|
[17] |
BABU D S V . Efficient and privacy-preserving range query over outsourced cloud[D]. Fredericton:Fredericton University of New Brunswick, 2018.
|