Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment
References
3,008 citations
3
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Song [7] proposed the first symmetric searchable encryption, where the time complexity of their scheme is proportional to the cardinality of the data collection....
[...]
...Data perturbation and secure multi-party computation approaches are a few of the many possible solutions [5,6,7] which being considered for solving this problem....
[...]
2,716 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Data perturbation and secure multi-party computation approaches are a few of the many possible solutions [5,6,7] which being considered for solving this problem....
[...]
2,194 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Data Mining Over Encrypted Data [3,4] poses three main problems -...
[...]
...Data Mining Over Encrypted Data [3,4] poses three main problems - First is the confidentiality of the encrypted data....
[...]
...Because of its homomorphic encryption properties, this scheme [3] is considered to be highly malleable in the sense that it is susceptible to adaptive chosen-ciphertext attacks....
[...]
1,560 citations
"Algorithm for Multi Keyword Search ..." refers background or methods in this paper
...Data Mining Over Encrypted Data [3,4] poses three main problems -...
[...]
...Data Mining Over Encrypted Data [3,4] poses three main problems - First is the confidentiality of the encrypted data....
[...]
...The use of Elliptic Curve in cryptography was proposed independently by Neal Koblitz [4] and Victor S. Miller [5] in 1985....
[...]
...The use of Elliptic Curve in cryptography was proposed independently by Neal Koblitz [4] and Victor S....
[...]
1,271 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Pascal Paillier, in 1999, proposed the Paillier encryption scheme [2], which is a probabilistic public-key algorithm....
[...]
...For enterprise users, company financial data, government documents, user databases are outsourced, which gives rise to security concerns [2]....
[...]