[1] NAMASUDRA S.Data access control in the cloud computing environment for bioinformatics[J].International Journal of Applied Research in Bioinformatics, 2021, 11(1):40-50. [2] MOHAMMED SADEEQ M, ABDULKAREEM N M, ZEEBAREE S R M, et al.IoT and cloud computing issues, challenges and opportunities:a review[J].Qubahan Academic Journal, 2021, 1(2):1-7. [3] MANSOURI N, GHAFARI R, ZADE B M H.Cloud computing simulators:a comprehensive review[J].Simulation Modelling Practice and Theory, 2020, 104:1-10. [4] SONG D X, WAGNER D, PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of 2000 IEEE Symposium on Security and Privacy.Washington D.C., USA:IEEE Press, 2000:44-55. [5] XU P, HE S H, WANG W, et al.Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks[J].IEEE Transactions on Industrial Informatics, 2018, 14(8):3712-3723. [6] STEFANOV E, PAPAMANTHOU C, SHI E.Practical dynamic searchable encryption with small leakage[C]//Proceedings of 2014 Network and Distributed System Security Symposium.Reston, USA:Internet Society, 2014:72-75. [7] CASH D, JARECKI S, JUTLA C, et al.Highly-scalable searchable symmetric encryption with support for Boolean queries[C]//Proceedings of CRYPTO'13.Berlin, Germany:Springer, 2013:353-373. [8] HU S S, CAI C J, WANG Q, et al.Searching an encrypted cloud meets blockchain:a decentralized, reliable and fair realization[C]//Proceedings of 2018 IEEE Conference on Computer Communications.Washinton D.C., USA:IEEE Press, 2018:792-800. [9] CASH D, GRUBBS P, PERRY J, et al.Leakage-abuse attacks against searchable encryption[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2015:668-679. [10] ISLAM M S, KUZU M, KANTARCIOGLU M.Access pattern disclosure on searchable encryption:ramification, attack and mitigation[EB/OL].[2021-08-10].https://personal.utdallas.edu/~mxk055100/publications/ndss2012.pdf. [11] ZHANG Y P, KATZ J, PAPAMANTHOU C.All your queries are belong to us:the power of file-injection attacks on searchable encryption[C]//Proceedings of the 25th USENIX Conference on Security Symposium.[S.l.]:USENIX, 2016:707-720. [12] CHAMANI J G, PAPADOPOULOS D, PAPAMANTHOU C, et al.New constructions for forward and backward private symmetric searchable encryption[C]//Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2018:1038-1055. [13] SONG X F, DONG C Y, YUAN D D, et al.Forward private searchable symmetric encryption with optimized I/O efficiency[J].IEEE Transactions on Dependable and Secure Computing, 2020, 17(5):912-927. [14] BOST R.∑oφoς:forward secure searchable encryption[C]//Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2016:1143-1154. [15] WEI Y, LÜ S Y, GUO X J, et al.FSSE:forward secure searchable encryption with keyed-block chains[J].Information Sciences, 2019, 500:113-126. [16] BOST R, MINAUD B, OHRIMENKO O.Forward and backward private searchable encryption from constrained cryptographic primitives[C]//Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2017:1465-1482. [17] SUN S F, YUAN X L, LIU J K, et al.Practical backward-secure searchable encryption from symmetric puncturable encryption[C]//Proceedings of 2018 ACM SIGSAC Conference on Computer and Communications Security.New York, USA:ACM Press, 2018:763-780. [18] BONEH D, DI CRESCENZO G, OSTROVSKY R, et al.Public key encryption with keyword search[C]//Proceedings of EUROCRYPT'04.Berlin, Germany:Springer, 2004:506-522. [19] ZHANG Y L, LIU X Z, LANG X L, et al.VCLPKES:verifiable certificateless public key searchable encryption scheme for industrial Internet of things[J].IEEE Access, 2020, 8:20849-20861. [20] YANG N B, XU S M, QUAN Z.An efficient public key searchable encryption scheme for mobile smart terminal[J].IEEE Access, 2020, 8:77940-77950. [21] CHEN B W, WU L B, KUMAR N, et al.Lightweight searchable public-key encryption with forward privacy over IIoT outsourced data[J].IEEE Transactions on Emerging Topics in Computing, 2021, 9(4):1753-1764. [22] CHEN B W, WU L B, WANG H Q, et al.A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks[J].IEEE Transactions on Vehicular Technology, 2020, 69(6):5813-5825. [23] BONEH D, WATERS B.Constrained pseudorandom functions and their applications[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Berlin, Germany:Springer, 2013:280-300. |