[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.(FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.)
[2] SONG D X, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2000:44-55.
[3] GOH E. Secure indexes[EB/OL].[2018-12-16]. https://eprint.iacr.org/2003/216.pdf.
[4] KUZU M, ISLAM M S, KANTARCIOGLU M. Efficient similarity search over encrypted data[C]//Proceedings of the IEEE 28th International Conference on Data Engineering. Piscataway, NJ:IEEE, 2012:1156-1167.
[5] KRISHNA C R, MITTAL S A. Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data[C]//Proceedings of the 2016 International Conference on Computing, Communication and Automation. Piscataway, NJ:IEEE, 2016:1187-1194.
[6] WANG J, YU X, ZHAO M. Privacy-preserving ranked multi-keyword fuzzy search on cloud encrypted data supporting range query[J]. Arabian Journal for Science and Engineering, 2015, 40(8):2375-2388.
[7] YAO H, XING N, ZHOU J, et al. Secure index for resource-constraint mobile devices in cloud computing[J]. IEEE Access, 2016, 4:9119-9128.
[8] LI X, CUI Y, ZHOU M, et al. Efficient multi-keyword fuzzy search on encrypted data in cloud storage[C]//Proceedings of the 2017 4th International Conference on Information Science and Control Engineering. Washington, DC:IEEE Computer Society, 2017, 1:288-294.
[9] CAO N, WANG C, LI M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1):222-233.
[10] LI H, YANG Y, LUAN T H, et al. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(3):312-325.
[11] WONG W K, CHEUNG D W, KAO B, et al. Secure kNN computation on encrypted databases[C]//Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2009:139-152.
[12] XIA Z, WANG X, SUN X, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2):340-352.
[13] ZHU X, DAI H, YI X, et al. MUSE:an efficient and accurate verifiable privacy-preserving multi-keyword text search over encrypted cloud data[J]. Security and Communication Networks, 2017, 2017(2):No.1923476.
[14] CHEN L, SUN X, XIA Z, et al. An efficient and privacy-preserving semantic multi-keyword ranked search over encrypted cloud data[J]. International Journal of Security and its Applications, 2014, 8(2):323-332.
[15] 杨宏宇,王玥.云存储环境下的多关键字密文搜索方法[J].计算机应用,2018,38(2):343-347.(YANG H Y, WANG Y. Multi-keyword ciphertext search method in cloud storage environment[J]. Journal of Computer Applications, 2018, 38(2):343-347.)
[16] CHARIKAR M S. Similarity estimation techniques from rounding algorithms[C]//Proceedings of the 34th Annual ACM Symposium on Theory of Computing. New York:ACM, 2002:380-388.
[17] MANKU G S, JAIN A, das SARMA A. Detecting near-duplicates for Web crawling[C]//Proceedings of the 16th International Conference on World Wide Web. New York:ACM, 2007:141-150.
[18] 杨旸,杨书略,柯闽.加密云数据下基于Simhash的模糊排序搜索方案[J].计算机学报,2017,40(2):431-444.(YANG Y, YANG S L, KE M. Ranked fuzzy keyword search based on Simhash over encrypted cloud data[J]. Chinese Journal of Computers, 2017, 40(2):431-444.) |