2011
DOI: 10.1186/1687-1499-2011-64
|View full text |Cite
|
Sign up to set email alerts
|

PKIS: practical keyword index search on cloud datacenter

Abstract: This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, they do not focus on the interoperability of the encrypted DB. In order to address this lack of practical aspects, we conduct two practical approaches-efficiency and group search in cloud datacenter. The process of this paper is as follows: first, we create two schemes of effi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…(2.3) Reversed Hash Chain: SISS should guarantee forward secrecy and backward accessibility, along with group key secrecy [5], which are security requirements in group information sharing system. In SISS, every member's group key is generated based on reversed one-way hash chain.…”
Section: Methods and Contributions The Main Methods And Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…(2.3) Reversed Hash Chain: SISS should guarantee forward secrecy and backward accessibility, along with group key secrecy [5], which are security requirements in group information sharing system. In SISS, every member's group key is generated based on reversed one-way hash chain.…”
Section: Methods and Contributions The Main Methods And Contributionmentioning
confidence: 99%
“…They accomplished both security properties with reversed hash key chain. Thereafter, they made the formal definition for 'backward accessibility' firstly in [5], where they proposed two practical group search schemes in the respect of efficiency in cloud datacenter. As for the researches not based on reversed hash key chain, Wang et.…”
Section: Related Work and Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many data security risks [1] in cloud. For this problem, many security technologies are proposed, such as the searchable encryption [2,3], data deletion proving [4,5], provable data possession [6,7] and trusted computing [8]. However, there is the performance limitation issue of mobile client when performing above technologies, affecting on user experience.…”
Section: Introductionmentioning
confidence: 99%
“…Number of studies referring to the proposed taxonomy-type of result Boolean results19,[37][38][39][40]44,45,[50][51][52]63,68,71,74,75,89,95,101,106,111,114,115,[120][121][122][123]125,[127][128][129]140,154,187 2.Ranked results[12][13][14]16,[27][28][29]35,36,43,46,49,53,[55][56][57][58][59][60]…”
mentioning
confidence: 99%