[1] Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
[2] Heiser J,Nicolett M.Assessing the security risks of cloud computing[J].Gartner Report,2008,27:29-52.
[3] 王小峰,陈培鑫,周寰,等.一种可信安全的层次式基于身份加密系统[J].电子学报,2016,44(7):1521-1529. WANG Xiaofeng,CHEN Peixin,ZHOU Huan,et al.A trustworthy and secure hierarchical identity-based encryption system[J].Acta Electronica Sinica,2016,44(7):1521-1529.(in Chinese)
[4] Wang C,Ren K,Yu S,et al.Achieving usable and privacy-assured similarity search over outsourced cloud data[A].INFOCOM,2012 Proceedings IEEE[C].Orlando,FL,USA:IEEE,2012.451-459.
[5] Sanchez D,Batet M,Isern D,et al.Ontology-based semantic similarity:A new feature-based approach[J].Expert Systems with Applications,2012,39(9):7718-7728.
[6] Desai S S,Laxminarayana J A.WordNet and semantic similarity based approach for document clustering[A].Computation System and Information Technology for Sustainable Solutions(CSITSS),International Conference on[C].Bangalore,India:IEEE,2016.312-317.
[7] Li M,Yu S,Cao N,et al.Authorized private keyword search over encrypted data in cloud computing[A].Distributed Computing Systems(ICDCS),201131st International Conference on[C].Minneapolis,MN,USA:IEEE,2011.383-392.
[8] 袁科,刘哲理,贾春福,等.一对多场景下的公钥时控性可搜索加密[J].电子学报,2015,43(4):760-768. YUAN Ke,Liu Zheli,JIA Chunfu,et al.Public key timed-release searchable encryption in one-to-many scenarios[J].Acta Electronica Sinica,2015,43(4):760-768.(in Chinese)
[9] Fu Z,Sun X,Linge N,et al.Achieving effective cloud search services:multi-keyword ranked search over encrypted cloud data supporting synonym query[J].IEEE Transactions on Consumer Electronics,2014,60(1):164-172.
[10] Wang C,Cao N,Li J,et al.Secure ranked keyword search over encrypted cloud data[A].Distributed Computing Systems(ICDCS),2010 IEEE 30th International Conference on[C].Genova,Italy:IEEE,2010.253-262.
[11] 杨旸,杨书略,柯闽.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444. YANG Yang,YANG Shulue,KE Min.Ranked fuzzy keyword search based on simhash over encrypted cloud data[J].Chinese Journal of Computers,2017,40(2):431-444.(in Chinese)
[12] Cao N,Wang C,Li M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(1):222-233.
[13] Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[A].Security and Privacy,2000,S&P 2000,Proceedings,2000 IEEE Symposium on[C].Berkeley,CA,USA:IEEE,2000.44-55.
[14] Li J,Wang Q,Wang C,et al.Fuzzy keyword search over encrypted data in cloud computing[A].INFOCOM,2010 Proceedings IEEE[C].San Diego,CA,USA:IEEE,2010.1-5.
[15] Curtmola R,Garay J,Kamara S,et al.Searchable symmetric encryption:improved definitions and efficient constructions[J].Journal of Computer Security,2011,19(5):895-934.
[16] Fu Z,Ren K,Shu J,et al.Enabling personalized search over encrypted outsourced data with efficiency improvement[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(9):2546-2559.
[17] Zhang W,Lin Y,Xiao S,et al.Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing[J].IEEE Transactions on Computers,2016,65(5):1566-1577.
[18] Wang J,Chen X,Ma H,et al.A verifiable fuzzy keyword search scheme over encrypted data[J].J Internet Serv Inf Secur,2012,2(1/2):49-58.
[19] Xia Z,Wang X,Sun X,et al.A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.
[20] Internet Society.Request for Comments[EB/OL].http://www.ietf.org/rfc.html,1969-04-07/2017-12-17. |