1 |
D. X. Song, D. Wagner and A. Perrig, "Practical Techniques for Searching on Encrypted Data," Symposium on Security and Privacy, California, USA, May, 2000, pp.14-17.
|
2 |
E. J. Goh, "Secure Indexes," ePrint Crpytography Archive, 2004.
|
3 |
R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proceedings of the 13th ACM conference on Computer and communications security, Virginia, USA, October, 2006.
|
4 |
D. Boneh, G. Crescenzo, R. Ostrovsky and G. Persiano, "Public Key Encryption with Keyword Search," Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May, 2004.
|
5 |
D. Boneh and B. Waters, Conjunctive, "Subset and Range Queries on Encrypted Data," Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, Netherlands, Febraury, 2007.
|
6 |
Y. H. Hwang and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system," Proceeding of First International Conference on Pairing-Based Cryptog-raphy, Tokyo, Japan, July, 2007.
|
7 |
F. Bao, R. H. Deng, X. Ding, and Y. Yang, "Private Query on Encrypted Data in Multi-User Set-tings," Proceeding of the 4th international conference on Information security practice and experi-ence, Sydney, Australia, April, 2008.
|
8 |
Kamara, S. and Lauter. K., "Cryptographic Cloud Storage," Proceedings of Workshops on Financial Cryptography and Data Security, Canary Islands, Spain, January, 2010.
|
9 |
Ion, M., Russello, G. and Crispo, B., "Enforcing Multi-user Access Policies to Encrypted Cloud Da-tabases," International Symposium on Policies for Distributed Systems and Networks, Trento, Italy, June, 2011.
|
10 |
B. Zhang, and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search," Journal of Network and Computer Applications. Vol 34, No.1, 2011.
|
11 |
Y. Yang, "Towards Multi-user Private Keyword Search for Cloud Computing," Proceeding of Inter-national Conference on Cloud Computing, Singapore, Singapore, July, 2011.
|
12 |
Chen, X., Li, Y., "Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Stor-age," I.J. Computer Network and Information Security. Vol.3, No.2, 2011.
|
13 |
S. Ghemawat, H. Gobioff, and S. Leung, "The Google File System," Proceedings of the nineteenth ACM symposium on Operating systems principles, Newyork, USA, December, 2003.
|
14 |
D Borthakur, "The Hadoop Distributed File Aystem: Architecture and Design," http://svn.apache.org/repos/asf/hadoop/common/tags/release-0.16.1/docs/hdfs_design.pdf
|