May 2013
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 14, Downloads (12 Months): 156, Downloads (Overall): 1,092
Full text available:
PDF
With the increasing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet practically-efficient secure search functions over encrypted data a challenging problem. In this paper, we ...
Keywords:
privacy-preserving search, multi-keyword search, similarity-based ranking, cloud computing
Keywords:
privacy-preserving search
Full Text:
... May 8?10, 2013, Hangzhou, China.Copyright 2013 ACM 978-1-4503-1767-2/13/05 ...$15.00.KeywordsCloud Computing; Privacy- -preserving Search; ; Multi-keywordSearch; Similarity-based Ranking1. INTRODUCTIONCloud computing is a new model ...
May 2017
ACM Computing Surveys (CSUR): Volume 50 Issue 3, June 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 164, Downloads (12 Months): 236, Downloads (Overall): 236
Full text available:
PDF
Searchable Symmetric Encryption (SSE) when deployed in the cloud allows one to query encrypted data without the risk of data leakage. Despite the widespread interest, existing surveys do not examine in detail how SSE’s underlying structures are designed and how these result in the many properties of a SSE scheme. ...
Keywords:
Searchable encryption, cloud security, privacy-preserving search, computing in the encrypted domain
Keywords:
privacy-preserving search
Full Text:
... authentication codes;Additional Key Words and Phrases: Searchable encryption, cloud security, privacy- -preserving search, , com-puting in the encrypted domainACM Reference Format:Geong Sen Poh, ...