New construction of secure range query on encrypted data in cloud computing

被引:0
|
作者
Wang, Shao-Hui [1 ,2 ,3 ]
Han, Zhi-Jie [1 ,2 ,4 ]
Chen, Dan-Wei [1 ,2 ]
Wang, Ru-Chuan [1 ,2 ]
机构
[1] College of Computer, Nanjing University of Posts and Telecommunications, Nanjing,210003, China
[2] Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing,210003, China
[3] Network and Data Security Key Laboratory of Sichuan Province, Chengdu,610054, China
[4] School of Computer and Information Engineering, Henan University, Zhengzhou,475004, China
来源
关键词
Number: 61373006,61373139, Acronym: -, Sponsor: -;
D O I
10.11959/j.issn.1000-436x.2015031
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Query based computations on encrypted data through homomorphic encryption in cloud computing security
    Biksham, V.
    Vasumathi, D.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3820 - 3825
  • [32] MixGeo: Efficient Secure Range Queries on Encrypted Dense Spatial Data in the Cloud
    Guo, Ruoyang
    Qin, Bo
    Wu, Yuncheng
    Liu, Ruixuan
    Chen, Hong
    Li, Cuiping
    [J]. PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS 2019), 2019,
  • [33] Secure Encrypted Image Search in Mobile Cloud Computing
    Zou, Qin
    Wang, Jianfeng
    Chen, Xiaofeng
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 572 - 575
  • [34] Efficient multi-keyword ranked query over encrypted data in cloud computing
    Li, Ruixuan
    Xu, Zhiyong
    Kang, Wanshang
    Yow, Kin Choong
    Xu, Cheng-Zhong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 : 179 - 190
  • [35] Similarity Search for Encrypted Images in Secure Cloud Computing
    Li, Yingying
    Ma, Jianfeng
    Miao, Yinbin
    Wang, Yue
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (02) : 1142 - 1155
  • [36] Secure and controllable k-NN query over encrypted cloud data with key confidentiality
    Zhu, Youwen
    Huang, Zhiqiu
    Takagi, Tsuyoshi
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2016, 89 : 1 - 12
  • [37] Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud
    Zhu, Youwen
    Zhang, Yue
    Li, Xingxin
    Yan, Hongyang
    Li, Jing
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [38] Secure Similar Patients Query on Encrypted Genomic Data
    Mahdi, Md Safiur Rahman
    Al Aziz, Md Momin
    Alhadidi, Dima
    Mohammed, Noman
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2019, 23 (06) : 2611 - 2618
  • [39] Collusion-Resisting Secure Nearest Neighbor Query over Encrypted Data in Cloud, Revisited
    Zhu, Youwen
    Wang, Zhikuan
    Wang, Jian
    [J]. 2016 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2016,
  • [40] A secure data sharing and query processing framework via federation of cloud computing
    Samanthula, Bharath K.
    Elmehdwi, Yousef
    Howser, Gerry
    Madria, Sanjay
    [J]. INFORMATION SYSTEMS, 2015, 48 : 196 - 212