参考文献
[1]Fox A,Griffith R,Joseph A,et al.Above the Clouds:A Berkeley View of Cloud Computing[D].Berkeley,USA:Department of Electrical Engineering and Computer Sciences,University of California,2009.
[2]Chakraborty R,Ramireddy S,Raghu T S,et al.The Information Assurance Practices of Cloud Computing Vendors[J].IT Professional,2010,12(4):29-37.
[3]Takabi H,Joshi B D,Ahn G J.Security and Privacy Challenges in Cloud Computing Environments[J].IEEE Security & Privacy,2010,8(6):24-31.
[4]Subashini S,Kavitha V.A Survey on Security Issues in Service Delivery Models of Cloud Computing[J].Journal of Network and Computer Applications,2011,34(1):1-11.
[5]Popovic K,Hocenski Z.Cloud Computing Security Issues and Challenges[C]//Proceedings of IEEE MIPRO’10.Washington D.C.,USA:IEEE Press,2010:344-349.
[6]Song D X,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2000:44-55.
[7]沈志荣,薛巍,舒继武.可搜索加密机制研究与进展[J].软件学报,2014,25(4):880-895.
[8]Curtmola R,Garay J,Kamara S,et al.Searchable Symmetric Encryption:Improved Definitions and Efficient Constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.New Yrok,USA:ACM Press,2006:79-
88.
[9]Kamara S,Papamanthou C,Roeder T.CS2:A Searchable Cryptographic Cloud Storage System,TechReport:MSR-TR-2011-58[R].Redmond,USA:Microsoft Research,2011.
[10]Chase M,Kamara S.Structured Encryption and Controll-ed Disclosure[C]//Proceedings of ASIACRYPT’10.Berlin,Germany:Springer,2010:577-594.
[11]Boneh D,Di-Crescenzo G,Ostrovsky R,et al.Public Key Encryption with Keyword Search[C]//Proceedings of Advances in Cryptology-Eurocrypt’04.Berlin,Germany:Springer,2004:506-522.
[12]Abdalla M,Bellare M,Catalano D,et al.Searchable Encryption Revisited:Consistency Properties,Relation to Anonymous IBE,and Extensions[C]//Proceedings of Advances in Cryptology-CRYPTO’05.Berlin,Germany:Springer, 2005:205-222.
[13]Boneh D,Kushilevitz E,Ostrovsky R,et al.Public Key Encryption that Allows PIR Queries[C]//Proceedings of Advances in Cryptology-CRYPTO’07.Berlin,Germany:Springer, 2007:50-67.
[14]Cao N,Wang C,Li M,et al.Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233.
[15]Wang C,Cao N,Li J,et al.Secure Ranked Keyword Search over Encrypted Cloud Data[C]//Proceedings of the 30th IEEE International Conference on Distributed Computing Systems.Washington D.C.,USA:IEEE Press,2010:253-262.
[16]Swaminathan A,Mao Y,Su G M,et al.Confidentiality-preserving Rank-ordered Search[C]//Proceedings of 2007 ACM Workshop on Storage Security and Survivabi-lity.New Yrok,USA:ACM Press,2007:7-12.
[17]Fredman M L,Komlós J,Szemerédi E.Storing a Sparse Table with O(1) Worst Case Access Time[J].Journal of the ACM,1984,31(3):538-544.
[18]Boldyreva A,Chenette N,Lee Y,et al.Order-preserving Symmetric Encryption[C]//Proceedings of Advances in Cryptology-EUROCRYPT’09.Berlin,Germany:Springer,2009:224-241.
编辑索书志 |