Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Public Key Encryption with Keyword Search Revisited
ICCSA '08 Proceeding sof the international conference on Computational Science and Its Applications, Part I
Data Security in the World of Cloud Computing
IEEE Security and Privacy
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
Trapdoor security in a searchable public-key encryption scheme with a designated tester
Journal of Systems and Software
Deterministic and efficiently searchable encryption
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
An efficient public key encryption with conjunctive-subset keywords search
Journal of Network and Computer Applications
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
IEEE Transactions on Parallel and Distributed Systems
On a security model of conjunctive keyword search over encrypted relational database
Journal of Systems and Software
Experiments with queries over encrypted data using secret sharing
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Efficient conjunctive keyword search on encrypted data storage system
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Public key encryption with conjunctive field keyword search
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Design and Development of EMR Supporting Medical Process Management
Journal of Medical Systems
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
Future Generation Computer Systems
Hi-index | 0.00 |
With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients' electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.