Design and implementation of multi-user secure indices for encrypted cloud storage
Citations
25 citations
5 citations
5 citations
Cites background from "Design and implementation of multi-..."
...Cloud secure architecture [10, 11] by using encryption/searchable encryption technologies allows the search process in the form of encrypted data and the retrieval of data in a safe manner....
[...]
2 citations
Cites background from "Design and implementation of multi-..."
...al[2] report a design and implementation of an encrypted cloud storage system that supports multi-user secure indices, allowing efficient search among encrypted documents of multiple users....
[...]
1 citations
References
3,300 citations
"Design and implementation of multi-..." refers background in this paper
...supports both controlled and hidden search, as well as query isolation [9]....
[...]
3,024 citations
"Design and implementation of multi-..." refers background in this paper
...Keyword search over encrypted data can also be achieved in a public-key setting [13], [14]....
[...]
1,918 citations
1,630 citations
"Design and implementation of multi-..." refers methods in this paper
...To remedy this problem, we devise a new way to avoid it by incorporating more than one index servers in our architecture [18], [19], [20], [21]....
[...]
1,351 citations
"Design and implementation of multi-..." refers methods in this paper
...proposed incorporating additional indexing information using non-injective maps to support SQL queries [15]....
[...]