Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing |
Zhu, Hong
(School of Computer Science and Technology, Huazhong University of Science and Technology)
Wu, Bin (School of Computer Science and Technology, Huazhong University of Science and Technology) Xie, Meiyi (School of Computer Science and Technology, Huazhong University of Science and Technology) Cui, Zongmin (School of Information Science and Technology, Jiujiang University) |
1 |
D. Chen, Y. Dong, X. Huang, H. Chen and D. Wang, “A community finding method for weighted dynamic online social network based on user behavior,” |
2 |
H.B.M. Shashikala, R. George and K.A. Shujaee, “Outlier detection in network data using thebetweenness centrality,” in |
3 |
G. Strang, “ |
4 |
D.X. Song, D. Wagner and A. Perrig, “Practical techniques for searches on encrypted data,” in |
5 |
E.J. Goh, “Secure indexes,” |
6 |
J. Baek, R. Safavi-Naini and W. Susilo, “Public key encryption with keyword search revisited,” in |
7 |
Y.C. Chang and M. Mitzenmacher, “Privacy preserving keyword searches on remote encrypted data,” in |
8 |
R. Curtmola, J. Garay, S. Kamara and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in |
9 |
T.Moataz and A. Shikfa, “Boolean symmetric searchable encryption,” in |
10 |
S. Kamara, C. Papamanthou, and T. Roeder, “Dynamic searchable symmetric encryption,” in |
11 |
D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.C. Rosu, and M. Steiner, “Dynamic searchable encryption in very-large databases: Data structures and implementation,” in |
12 |
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.C. Rosu, and M. Steiner, “Highly-scalable searchable symmetric encryption with support for boolean queries,” in |
13 |
A.A. Yavuz and J. Guajardo, “Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware,” |
14 |
N. Cao, Z. Yang, C. Wang, K. Ren and W. Lou, “Privacy-preserving query over encrypted graph-structured data in cloud computing,” in |
15 |
M. Chase and S. Kamara, “Structured encryption and controlled disclosure,” in |
16 |
Y. Zhang, S. Su, Y. Wang, W. Chen and F. Yang, “Privacy-assured substructure similarity query over encrypted graph-structured data in cloud,” |
17 |
S. Goldwasser and S. Micali, “Probabilistic encryption,” |
18 |
Z. Fan, B. Choi, J. Xu and S.S. Bhowmick, “Asymmetric structure-preserving subgraph queries for large graphs,” in |
19 |
B. Zong, R. Raghavendra, M. Srivatsa, X. Yan, A.K. Singh and K.W. Lee, “Cloud service placement via subgraph matching,” in |
20 |
T.K. Saha, B. Zhang and M.A. Hasan, “Name disambiguation from link data in a collaboration graph using temporal and topological features,” |
21 |
Z. Cui, H. Zhu and L. Chi, “Lightweight key management on sensitive data in the cloud,” |
22 |
Y.J. Ren, J. Shen, J. Wang, J. Han and S.Y. Lee, “Mutual verifiable provable data auditing in public cloud storage,” |
23 |
Z. Fu, X. Sun, Q. Liu, L. Zhou and J. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” |
24 |
Y. Liu, H.L.Wu and C.C. Chang, “A Fast and Secure Scheme for Data Outsourcing in the Cloud,” |
25 |
O. Goldreich, “ |
26 |
Z. Cui, H. Zhu, J. Shi, L. Chi and K. Yan, “Lightweight management of authorization update on cloud data,” in |
27 |
Z. Fu, K. Ren, J. Shu, X. Sun and F. Huang, “Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement,” |
28 |
R. West, H.S. Paskov, J. Leskovec, and C. Potts, “Exploiting social network structure for person-to-person sentiment analysis,” |
29 |
N.D. Han, L. Han, D.M. Tuan, H.P. In and M. Jo, “A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks,” |
30 |
Z. Xia, X. Wang, X. Sun and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,” |
31 |
M. Radovanovic, A. Nanopoulos and M. Ivanovic, “Reverse nearest neighbors in unsupervised distance-based outlier detection,” |
32 | H. Li, F. Li, C. Song, and Y. Yan, “Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing,” KSII Transactions on Internet and Information Systems (TIIS), vol. 9, no. 7, pp. 2719-2735, 2015. Article (CrossRef Link) DOI |
33 |
M. Potamias, F. Bonchi, A. Gionis and G. Kollios, “k-Nearest neighbors in uncertain graphs,” in |
34 |
H. Maserrat and J. Pei, “Neighbor query friendly compression of social networks,” in |
35 |
M.A. Bhuiyan and M.A. Hasan, “An iterative mapreduce based frequent subgraph mining algorithm,” |
36 |
J. Leskovec, K.J. Lang, A. Dasgupta and M.W. Mahoney, “Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters,” |
37 |
B. Klimt and Y. Yang, “Introducing the enron corpus,” in |