3Huang R W, Gui X L, Yu S, Zhuang W. Study of privacypreserving framework for cloud storage. Computer Science and Information Systems, 2011, 8(3):801-819.
4Liu Q, Wang G J, Wu J. An efficient privacy preserving keyword search scheme in cloud computing//Proceedings of the 12th IEEE International Conference on Computational Science and Engineering (CSE' 09). Vancouver, Canada, 2009:715-720.
5Bonech D, Crescenzo G D, Ostrovsky R, Persiano G. Public-key eneryption with keyword search//Proceedings oI the Eurocrypt 2004. Interlaken, Switzerland, 2004: 506-522.
6Song D X, Wagner P, Perrig P. Practical techniques for searches on encrypted data//Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 2000:44-55.
7Wang W C, Li Z W, Owens R, Bhargava B. Secure and efficient access to outsourced data//Proceedings of the 2009 ACM Workshop on Cloud Computing Security. Chicago, Illinois, USA, 2009:55-66.
8Bellovin S M, Cheswick W R. Privacy-enhanced searches using encrypted bloom filters. Technical Report 2004/022, IACR ePrint Cryptography Archive, 2004.
9Ohtaki Y. Partial disclosure of searchable encrypted data with support for boolean queries//Proeeedings of the 3th International Conference on Availability, Reliability and Seeurity(ARES'2008). Barcelona, Spain, 2008: 1083-1090.
10Li J, Wang Q, Wang C et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th Conference on Computer Communications (INFOCOM 2010). San Diego, California, USA, 20101 1-5.