2009 International Conference on Computational Science and Engineering 2009
DOI: 10.1109/cse.2009.66
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing

Abstract: Abstract-A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a user should store his personal files in an encrypted form in a cloud, and then sends queries in the form of encrypted keywords. However, a simple encryption scheme may not work well when a user wants to retrieve only files containing certain keywords using a thin client. First, the user needs to encrypt and decrypt files freque… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 89 publications
(48 citation statements)
references
References 10 publications
0
47
0
1
Order By: Relevance
“…Literature [2] proposed an implementation of privacy protection in the cloud with keyword search mode, which supports service providers to participate in part of the work to protect tenants decrypt data privacy and user queries privacy. D. Huang et al [3] proposed a new cloud architecture, and compared to existing cloud services, which not only provides users with the computational complexity of services, while focusing on addressing threats to privacy and security management.…”
Section: Related Workmentioning
confidence: 99%
“…Literature [2] proposed an implementation of privacy protection in the cloud with keyword search mode, which supports service providers to participate in part of the work to protect tenants decrypt data privacy and user queries privacy. D. Huang et al [3] proposed a new cloud architecture, and compared to existing cloud services, which not only provides users with the computational complexity of services, while focusing on addressing threats to privacy and security management.…”
Section: Related Workmentioning
confidence: 99%
“…Hence this system is secure for polynomially many levels because it offers tight proof of security. An efficient privacy preserving keyword searching scheme in cloud computing concept is described by Liu et al [16]. His concept is to reduce the CPU capability and memory power by searching a certain keyword in the files.…”
Section: Related Workmentioning
confidence: 99%
“…Several researches have been conducted in developing SE scheme using public key cryptography [11][12][13][14][15][16].…”
Section: A Asymmetric Searchable Encryption (Ase)mentioning
confidence: 99%