References
- D. X. Song, D. Wagner and A. Perrig, "Practical Techniques for Searching on Encrypted Data," Symposium on Security and Privacy, California, USA, May, 2000, pp.14-17.
- E. J. Goh, "Secure Indexes," ePrint Crpytography Archive, 2004.
- R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proceedings of the 13th ACM conference on Computer and communications security, Virginia, USA, October, 2006.
- D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, "Public Key Encryption with Keyword Search," Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May, 2004.
- D. Boneh and B. Waters, Conjunctive, "Subset and Range Queries on Encrypted Data," Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, Netherlands, Febraury, 2007.
- Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Proceeding of First International Conference on Pairing-Based Cryptog-raphy, Tokyo, Japan, July, 2007.
- F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private Query on Encrypted Data in Multi-User Set-tings," Proceeding of the 4th international conference on Information security practice and experi-ence, Sydney, Australia, April, 2008.
- Kamara, S. and Lauter. K., "Cryptographic Cloud Storage," Proceedings of Workshops on Financial Cryptography and Data Security, Canary Islands, Spain, January, 2010.
- Ion, M., Russello, G. and Crispo, B., "Enforcing Multi-user Access Policies to Encrypted Cloud Da-tabases," International Symposium on Policies for Distributed Systems and Networks, Trento, Italy, June, 2011.
- B. Zhang, and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search," Journal of Network and Computer Applications. Vol 34, No.1, 2011.
- Y. Yang, "Towards Multi-user Private Keyword Search for Cloud Computing," Proceeding of Inter-national Conference on Cloud Computing, Singapore, Singapore, July, 2011.
- Chen, X., Li, Y., "Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Stor-age," I.J. Computer Network and Information Security. Vol.3, No.2, 2011.
- S. Ghemawat, H. Gobioff, and S. Leung, "The Google File System," Proceedings of the nineteenth ACM symposium on Operating systems principles, Newyork, USA, December, 2003.
- D Borthakur, "The Hadoop Distributed File Aystem: Architecture and Design," http://svn.apache.org/repos/asf/hadoop/common/tags/release-0.16.1/docs/hdfs_design.pdf
Cited by
- Digital forensics investigation methodology applicable for social network services vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-014-2061-8
- Efficient auto-scaling scheme for rapid storage service using many-core of desktop storage virtualization based on IoT vol.209, 2016, https://doi.org/10.1016/j.neucom.2016.05.090
- Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization Based on Cloud Infrastructure vol.6, pp.11, 2014, https://doi.org/10.3390/su6118079
- Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage vol.5, pp.1, 2015, https://doi.org/10.1186/s13673-015-0039-9
- G-Cloud Monitor: A Cloud Monitoring System for Factory Automation for Sustainable Green Computing vol.6, pp.12, 2014, https://doi.org/10.3390/su6128510
- Human-centric storage resource mechanism for big data on cloud service architecture vol.72, pp.7, 2016, https://doi.org/10.1007/s11227-015-1390-3
- A shareable keyword search over encrypted data in cloud computing 2015, https://doi.org/10.1007/s11227-015-1515-8
- Construction of Dynamic Medical Information System for Digital Hospital Environments vol.91, pp.4, 2016, https://doi.org/10.1007/s11277-015-3110-y
- Framework of Resource Management for Intercloud Computing vol.2014, 2014, https://doi.org/10.1155/2014/108286
- Efficient Sustainable Operation Mechanism of Distributed Desktop Integration Storage Based on Virtualization with Ubiquitous Computing vol.7, pp.6, 2015, https://doi.org/10.3390/su7067568
- Performance Improvement of Database Compression for OLTP Workloads vol.E97.D, pp.4, 2014, https://doi.org/10.1587/transinf.E97.D.976
- Individual learner big data based cloud role player game learning vol.21, 2017, https://doi.org/10.3233/IDA-170871
- The development of a medical image information system environment using data synchronization based on cloud computing vol.75, pp.23, 2016, https://doi.org/10.1007/s11042-015-2506-8
- Real-Time Terrain Storage Generation from Multiple Sensors towards Mobile Robot Operation Interface vol.2014, 2014, https://doi.org/10.1155/2014/769149
- Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing vol.91, pp.4, 2016, https://doi.org/10.1007/s11277-015-3121-8
- Evaluation and design of function for tracing diffusion of classified information for file operations with KVM vol.72, pp.5, 2016, https://doi.org/10.1007/s11227-016-1671-5
- Design and implementation of a Bloom filter-based data deduplication algorithm for efficient data management pp.1868-5145, 2018, https://doi.org/10.1007/s12652-018-0893-1
- Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain vol.8, pp.1, 2018, https://doi.org/10.1186/s13673-018-0136-7