2011 IEEE Third International Conference on Cloud Computing Technology and Science 2011
DOI: 10.1109/cloudcom.2011.43
|View full text |Cite
|
Sign up to set email alerts
|

Multi-User Private Keyword Search for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 92 publications
(53 citation statements)
references
References 7 publications
0
53
0
Order By: Relevance
“…The trend of distributing searchable encryption schemes into cloud [16,25,23,24] highlights the potential risks of search pattern leakage (as well as access pattern leakage). That is because large amounts of data centralizing into the cloud servers affiliates effective statistic attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The trend of distributing searchable encryption schemes into cloud [16,25,23,24] highlights the potential risks of search pattern leakage (as well as access pattern leakage). That is because large amounts of data centralizing into the cloud servers affiliates effective statistic attacks.…”
Section: Related Workmentioning
confidence: 99%
“…MUSE is a recent but active research topic [3,4,11,14,24,25,27,30,31,33]. We note however that despite the obvious risk that the CSP obtains some prior knowledge in a MUSE system through colluding users, only few schemes on MUSE [24,25,27] consider this risk in their security model.…”
Section: Multi-user Searchable Encryptionmentioning
confidence: 99%
“…A large number of MUSE schemes [3,4,11,14,24,25,30,31,33] share a common algorithmic structure regarding the application of queries on encrypted indices. In this structure, which we call iterative testing, an encrypted index denoted as C i is built by encrypting each keyword of W i separately.…”
Section: Common Weakness For Many Muse Schemesmentioning
confidence: 99%
“…Yanjiang Yang et al [16], Dan Boneh et al [2] and others proposed research work in the Searchable Encryption field. Most of these researches are based on creating an index of keywords for the searchable encrypted file and mapping the indexes to the words when searched.…”
Section: Related Workmentioning
confidence: 99%
“…This approach for searchable encryption uses deterministic encryption in which case the same word gets encrypted to the same cipher text each time. Unlike usual approaches of using indexes for searching keywords, implementation of searchable encryption by Song et al [16] is based on sequential scan of the entire document for the keyword.…”
Section: Searchable Symmetric Encryptionmentioning
confidence: 99%