Page 107 - Read Online
P. 107

Page 100                Salmani et al. J Surveill Secur Saf 2020;1:79–101  I http://dx.doi.org/10.20517/jsss.2020.16



               REFERENCES
               1.  Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. Proceeding 2000 IEEE Symposium on Security and
                  Privacy. S&P 2000; 2000 May 14–17; Berkeley, USA. New York: IEEE; 2000.
               2.  Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: International conference on the
                  theory and applications of crypto-graphic techniques; 2004 May 2–6; Interlaken, Switzerland. Berlin: Springer; 2004. pp. 506–522.
               3.  Chang YC, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. Proceedings of the Third international
                  conference on Applied Cryptography and Network; 2005 June 7–10; New York, USA. Berlin: Springer; 2005.
               4.  Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved defifinitions and effificient constructions.
                  Proceedings of the 13th ACM conference on Computer and communications security 2006; Alexandria Virginia, USA. New York: J
                  Comput Secur; 2006.
               5.  Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: International Conference on Applied Cryptog-
                  raphy and Network Security; 2004 June 8–11; Yellow Mountains, China. Springer, 2004. p. 31–45. Berlin: Springer; 2004.
               6.  Liu Q, Wang G, Wu J. Secure and privacy preserving keyword searching for cloud storage services. J Netw Comput Appl 2012; 35:
                  927–33.
               7.  Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, et al. Highly-scalable searchable symmetric encryption with support for boolean
                  queries. In: Advances in Cryptology–CRYPTO 2013; 2013 August 18–22; Santa Barbara, USA. Berlin: Springer, 2013. pp. 353–373.
               8.  Gai K, Zhu L, Qiu M, Xu K, Choo KKR. Multi-access filtering for privacy-preserving fog computing. IEEE Trans on Cloud Comput 2019;
                  1–1.
               9.  Cao N, Wang C, Li M, Ren K, Lou W. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel
                  Distrib Syst 2014; 25: 222–33.
               10. Fu Z, Ren K, Shu J, Sun X, Huang F. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE
                  Trans Parallel Distrib Syst 2016; 27: 2546–59.
               11. Yu J, Lu P, Zhu Y, Xue G, Li M. Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data. IEEE Trans Dependable
                  Secure Comput 2013 July; 10: 239–50.
               12. Liu C, Zhu L, Wang M, Tan Ya. Search pattern leakage in searchable encryption: Attacks and new construction. Inf Sci 2014; 265:
                  176–88.
               13. Perc M. Evolution of the most common English words and phrases over the centuries. J R Soc Interface 2012:rsif20120491.
               14. Wong WK, Cheung DW, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM
                  SIGMOD International Conference on Management of data; 2009, 29 June-2 July; Rhode Island, USA. New York: ACM, 2009. pp.
                  139–152.
               15. Goh EJ. Secure indexes. Cryptology ePrint Archive, Report 2003/216. Avialable from: http://eprint.iacr.org/2003/216/. [Last accessed on
                  25 Sep. 2020]
               16. Xia Z, Wang X, Sun X, Wang Q. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans
                  Parallel Distrib Syst 2016; 27: 340–52.
               17. Zerr S, Demidova E, Olmedilla D, Nejdl W, Winslett M et al. Zerber: r-confifidential indexing for distributed documents. In: Proceedings
                  of the 11th international conference on Extending database technology: Advances in database technology; 2008 March 25–29; Nantes,
                  France. New York: ACM; 2008. pp. 287–298.
               18. Guo Z, Zhang H, Sun C, Wen Q, Li W. Secure multi-keyword ranked search over encrypted cloud data for multiple data owners. J Syst
                  Softw 2018; 137: 380–95.
               19. Ramos J. Using tf-idf to determine word relevance in document queries. In: Proceedings of the first instructional conference on machine
                  learning. vol. 242. New Jersey, USA; 2003. pp. 133–42.
               20. Begum RS, Sugumar R. Novel entropy-based approach for cost-effective privacy preservation of intermediate datasets in cloud. Cluster
                  Computing 2019, 22: 9584–88.
               21. Niu B, Li Q, Zhu X, Cao G, Li H. Enhancing privacy through caching in location-based services. In: 2015 IEEE conference on computer
                  communications (INFOCOM); 2015 26 April-1 May; Hong Kong, China. New York: IEEE, 2015. pp. 1017–1025.
               22. Palanisamy B, Liu L. Mobimix: Protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International Con-
                  ference on Data Engineering, 2011 April 11–16; Hannover, Germany; New York: IEEE, 2011. pp. 494–505.
               23. Hulth A. Improved Automatic Keyword Extraction given More Linguistic Knowledge. In: Proceedings of the 2003 Conference on
                  Empirical Methods in Natural Language Processing. EMNLP ’03. USA: Association for Computational Linguistics; 2003. p. 216–223.
                  Available from: https://doi.org/10.3115/1119355.1119383.
               24. Sun W, Wang B, Cao N, Li M, Lou W, et al. Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based
                  Ranking. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ASIA CCS ’13.
                  New York, NY, USA: Association for Computing Machinery; 2013. p. 71–82. Available from: https://doi.org/10.1145/2484313.2484322.
               25. Goldreich O, Ostrovsky R. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 1996;43:431–73.
               26. Publication G. Archived Textbooks; Available from: https://www.gutenberg.org/ebooks. Last accessed: 27-August-2020.
               27. J L, Q W, C W, N C, K R, et al. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. In: 2010 Proceedings IEEE INFOCOM.
                  San Diego, CA, USA; 2010. pp. 1–5.
               28. Kuzu M, Islam MS, Kantarcioglu M. Effificient similarity search over encrypted data. In: Data Engineering (ICDE), 2012 IEEE 28th
                  International Conference on, 2012 April 1-5; Washington, USA; New York: IEEE, 2012. pp. 1156–67.
               29. Bellare M, Boldyreva A, O’Neill A. Deterministic and effificiently searchable encryption. In: Annual International Cryptology Conference,
   102   103   104   105   106   107   108   109   110   111   112