Encrypted Systems Lab (2017). Clusion v0.2.0.
https://github.com/encryptedsystems/Clusion.
Ferreira, B. and Domingos, H. (2013). Searching private
data in a cloud encrypted domain. In Proceedings of
the 10th Conference on Open Research Areas in Infor-
mation Retrieval (OAIR’13), pages 165 – 172. Centre
de Hautes Etudes Interantionales D’Informatique Do-
cumentaire (CID).
Ferreira, B., Leit
¯
ao, J., and Domingos, H. (2017). Mul-
timodal indexable encryption for mobile cloud-based
applications. In 47th Annual IEEE/IFIP International
Conference on Dependable Systems and Networks,
pages 213 – 224. IEEE.
Ferreira, B., Rodrigues, J., Leit
¯
ao, J., and Domingos, H.
(2015). Privacy-preserving content-based image re-
trieval in the cloud. In IEEE 34th Symposium on Reli-
able Distributed Systems, pages 11 – 20. IEEE.
Grubbs, P., McPherson, R., Naveed, M., Ristenpart, T., and
Shmatikov, V. (2016). Breaking web applications built
on top of encrypted data. In 23rd ACM Conference on
Computer and Communications Security (CCS’16),
pages 1353 – 1364. ACM.
Kamara, S. and Moataz, T. (2017). Boolean searcha-
ble symmetric encryption with worst-case sub-linear
complexity. In EUROCRYPT 2017, Part III, LNCS
10212, pages 94 – 124. IACR.
Krawczyk, H. (2005). Hmqv: A high-performance secure
diffie-hellman protocol. In Advances in Cryptology –
CRYPTO 2005, LNCS 3621, pages 546 – 566. Sprin-
ger.
Liu, C., Zhu, L., Wang, M., and Tan, Y.-A. (2014). Search
pattern leakage in searchable encryption: Attacks and
new construction. Information Sciences, 265:176 –
188.
Meteor Development Group Inc. (2014). Me-
teor: The fastest way to build javascript apps.
https://www.meteor.com.
Naveed, M., Kamara, S., and Wright, C. V. (2015). In-
ference attacks on property-preserving encrypted da-
tabases. In 22rd ACM Conference on Computer and
Communications Security (CCS’15), pages 644 – 655.
ACM.
New York Times (2016). Yahoo says 1 billion user accounts
were hacked. Dec. 14, 2016. https://www.nytimes.
com/2016/12/14/technology/yahoo-hack.html.
Popa, R., Redfield, C., Zeldovich, N., and Balakrishnan, H.
(2011a). CryptDB: Protecting confidentiality with en-
crypted query processing. In Twenty-Third ACM Sym-
posium on Operating Systems Principles (SOSP’11).
ACM.
Popa, R., Stark, E., Helfer, J., Valdez, S., Zeldovich, N.,
Kaashoek, M., and Balakrishnan, H. (2014a). Buil-
ding web applications on top of encrypted data using
Mylar. In 11th USENIX Conference on Networked Sy-
stems Design and Implementation (NSDI’14), pages
157 – 172. USENIX Association.
Popa, R. A., Redfield, C., Tu, S., Balakrishnan, H., Kaas-
hoek, F., Madden, S., Zeldovich, N., and Burrow, A.
(2011b). CryptDB. https://css.csail.mit. edu/cryptdb.
Popa, R. A., Stark, E., Valdez, S., Helfer, J., Zeldovich, N.,
Kaashoek, F., and Balakrishnan, H. (2014b). Mylar
research platform. https://css.csail.mit.edu/mylar/.
Shen, E., Shi, E., and Waters, B. (2009). Predicate privacy
in encryption systems. In Sixth IACR Thery of Cryp-
tography Conference (TCC 2009), LNCS 5444, pages
457 – 473. Springer Verlag.
Song, D. X., Wagner, D., and Perrig, A. (2000). Practical
techniques for searches on encrypted data. In 2000
IEEE Symposium on Security and Privacy (SP’00),
pages 44 – 55. IEEE.
Stefanov, E., Papamanthou, C., and Shi, E. (2014). Practical
dynamic searchable encryption with small leakage.
In Network and Distributed System Security (NDSS)
Symposium 2014. Internet Society.
The Guardian (2015). Massive anthem health insu-
rance hack exposes millions of customers’ details.
Feb. 05, 2015. https://www.theguardian.com/us-
news/2015/feb/05/millions-of-customers-health-
insurance-details-stolen-in-anthem-hack-attack.
Wu, T. (1998). The secure remote password protocol. In
Proceedings of the 1998 Internet Society Symposium
on Network and Distributed Systems Security, pages
97 – 111.
Zhang, Y., Katz, J., and Papamanthou, C. (2016). All your
queries are belong to us: The power of file-injection
attacks on searchable encryption. In 25th USENIX
Security Symposium (USENIX 16), pages 707 – 720.
USENIX.
IoTBDS 2018 - 3rd International Conference on Internet of Things, Big Data and Security
298