Multi-Keyword Search on Banking Data using Blockchain Technology
Abstract
Full Text:
PDFReferences
Zhihua Xia, Xinhui Wang, Xingming Sun and Qian Wang, “A Secure and
Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud
Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED
SYSTEMS, VOL. 27, NO. 2, FEBRUARY 2016.
Tianyue Peng, Yaping Lin and Xin Yao, “An Efficient Ranked MultiKeyword search for Multiple Data Owners Over Encrypted Cloud Data”,
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 18, NO. 2
MARCH 2018
Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, JiaNan
Liu, Yang Xiang, Robert H. Deng, “CrowdBC: A Blockchainbased
Decentralized Framework f IEEE Transactions on Parallel and Distributed
Systems” (Volume: 30, Issue: 6, June 1 2019).
Xin Yao, Yaping Lin and Qin Liu, “Privacy-preserving Search over
Encrypted Personal Health Record in Multi-Source Cloud”.
X. Wang, Y. L. Zhao, L. Nie, Y. Gao, W. Nie, Z. J. Zha, and T. S.
Chua, “Semantic-based location recommendation with multimodal venue
semantics”, IEEE Transactions on Multimedia, vol. 17, no. 3, pp. 409-
, Mar. 2015.
B. Wang, S. Yu, W. Lou, Y. Hou, “Privacy-preserving multi-keyword
fuzzy search over encrypted data in the cloud,” in: INFOCOM’14,
Toronto, Canada, 2014.
S. Pasupuleti, S. Ramalingam, R. Buyya, “An efficient and secure privacypreserving approach for outsourced data of resource constrained mobile
devices in cloud computing,” J NETW COMPUT APPL., vol. 64, pp. 12
– 22, 2016.
W. Sun, B. Wang, N. Cao, H. Li, W. Lou, Y. Hou, H. Li, “cy presePrivarving multi-keyword text search in the cloud supporting similarity based
ranking,” IEEE T Parall Distr., vol. 25, no. 11, pp. 3025 – 3035, 2014.
G. W. Peters and E. Panayi, “Understanding modern banking ledgers
through blockchain technologies: Future of transaction processing and
smart contracts on the internet of money,” in Banking Beyond Banks and
Money. New York, NY, USA: Springer-Verlag, 2016, pp. 239–278.
L. Luu et al., “A secure sharding protocol for open blockchains,” Proc.
ACM SIGSAC Conf. Comput. Commun. Security, 2016, pp. 17–30
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology