Page 107 - Read Online
P. 107
Page 100 Salmani et al. J Surveill Secur Saf 2020;1:79–101 I http://dx.doi.org/10.20517/jsss.2020.16
REFERENCES
1. Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. Proceeding 2000 IEEE Symposium on Security and
Privacy. S&P 2000; 2000 May 14–17; Berkeley, USA. New York: IEEE; 2000.
2. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: International conference on the
theory and applications of crypto-graphic techniques; 2004 May 2–6; Interlaken, Switzerland. Berlin: Springer; 2004. pp. 506–522.
3. Chang YC, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. Proceedings of the Third international
conference on Applied Cryptography and Network; 2005 June 7–10; New York, USA. Berlin: Springer; 2005.
4. Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved defifinitions and effificient constructions.
Proceedings of the 13th ACM conference on Computer and communications security 2006; Alexandria Virginia, USA. New York: J
Comput Secur; 2006.
5. Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: International Conference on Applied Cryptog-
raphy and Network Security; 2004 June 8–11; Yellow Mountains, China. Springer, 2004. p. 31–45. Berlin: Springer; 2004.
6. Liu Q, Wang G, Wu J. Secure and privacy preserving keyword searching for cloud storage services. J Netw Comput Appl 2012; 35:
927–33.
7. Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, et al. Highly-scalable searchable symmetric encryption with support for boolean
queries. In: Advances in Cryptology–CRYPTO 2013; 2013 August 18–22; Santa Barbara, USA. Berlin: Springer, 2013. pp. 353–373.
8. Gai K, Zhu L, Qiu M, Xu K, Choo KKR. Multi-access filtering for privacy-preserving fog computing. IEEE Trans on Cloud Comput 2019;
1–1.
9. Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel
Distrib Syst 2014; 25: 222–33.
10. Fu Z, Ren K, Shu J, Sun X, Huang F. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE
Trans Parallel Distrib Syst 2016; 27: 2546–59.
11. Yu J, Lu P, Zhu Y, Xue G, Li M. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data. IEEE Trans Dependable
Secure Comput 2013 July; 10: 239–50.
12. Liu C, Zhu L, Wang M, Tan Ya. Search pattern leakage in searchable encryption: Attacks and new construction. Inf Sci 2014; 265:
176–88.
13. Perc M. Evolution of the most common English words and phrases over the centuries. J R Soc Interface 2012:rsif20120491.
14. Wong WK, Cheung DW, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM
SIGMOD International Conference on Management of data; 2009, 29 June-2 July; Rhode Island, USA. New York: ACM, 2009. pp.
139–152.
15. Goh EJ. Secure indexes. Cryptology ePrint Archive, Report 2003/216. Avialable from: http://eprint.iacr.org/2003/216/. [Last accessed on
25 Sep. 2020]
16. Xia Z, Wang X, Sun X, Wang Q. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans
Parallel Distrib Syst 2016; 27: 340–52.
17. Zerr S, Demidova E, Olmedilla D, Nejdl W, Winslett M et al. Zerber: r-confifidential indexing for distributed documents. In: Proceedings
of the 11th international conference on Extending database technology: Advances in database technology; 2008 March 25–29; Nantes,
France. New York: ACM; 2008. pp. 287–298.
18. Guo Z, Zhang H, Sun C, Wen Q, Li W. Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J Syst
Softw 2018; 137: 380–95.
19. Ramos J. Using tf-idf to determine word relevance in document queries. In: Proceedings of the first instructional conference on machine
learning. vol. 242. New Jersey, USA; 2003. pp. 133–42.
20. Begum RS, Sugumar R. Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster
Computing 2019, 22: 9584–88.
21. Niu B, Li Q, Zhu X, Cao G, Li H. Enhancing privacy through caching in location-based services. In: 2015 IEEE conference on computer
communications (INFOCOM); 2015 26 April-1 May; Hong Kong, China. New York: IEEE, 2015. pp. 1017–1025.
22. Palanisamy B, Liu L. Mobimix: Protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International Con-
ference on Data Engineering, 2011 April 11–16; Hannover, Germany; New York: IEEE, 2011. pp. 494–505.
23. Hulth A. Improved Automatic Keyword Extraction given More Linguistic Knowledge. In: Proceedings of the 2003 Conference on
Empirical Methods in Natural Language Processing. EMNLP ’03. USA: Association for Computational Linguistics; 2003. p. 216–223.
Available from: https://doi.org/10.3115/1119355.1119383.
24. Sun W, Wang B, Cao N, Li M, Lou W, et al. Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based
Ranking. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ASIA CCS ’13.
New York, NY, USA: Association for Computing Machinery; 2013. p. 71–82. Available from: https://doi.org/10.1145/2484313.2484322.
25. Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 1996;43:431–73.
26. Publication G. Archived Textbooks; Available from: https://www.gutenberg.org/ebooks. Last accessed: 27-August-2020.
27. J L, Q W, C W, N C, K R, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In: 2010 Proceedings IEEE INFOCOM.
San Diego, CA, USA; 2010. pp. 1–5.
28. Kuzu M, Islam MS, Kantarcioglu M. Effificient similarity search over encrypted data. In: Data Engineering (ICDE), 2012 IEEE 28th
International Conference on, 2012 April 1-5; Washington, USA; New York: IEEE, 2012. pp. 1156–67.
29. Bellare M, Boldyreva A, O’Neill A. Deterministic and effificiently searchable encryption. In: Annual International Cryptology Conference,