2020
DOI: 10.1109/tdsc.2018.2864186
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(56 citation statements)
references
References 45 publications
0
56
0
Order By: Relevance
“…In this step, a user query is represented by a set of hashtags. Moreover, any search process [47]- [49] could be applied in this step to compute the score between the set of discovered patterns, and the hashtags of the user query.…”
Section: E Searching Processmentioning
confidence: 99%
“…In this step, a user query is represented by a set of hashtags. Moreover, any search process [47]- [49] could be applied in this step to compute the score between the set of discovered patterns, and the hashtags of the user query.…”
Section: E Searching Processmentioning
confidence: 99%
“…Yang et al [13] put forward a multiuser multi-keyword ranked search scheme to support arbitrary language query, which is constructed based on Paillier homomorphic encryption algorithm. He et al [14] suggested an attribute-based hybrid Boolean keyword search scheme based on prime-order bilinear groups. A lightweight traceable system supporting keyword search is proposed in [15], which offloads most of the heavy cryptographic computations to the cloud and realizes traitor tracing function.…”
Section: Related Work a Searchable Encryptionmentioning
confidence: 99%
“…In recent past, PEKS scheme was combined with ABAC to provide restricted access on personal health record (PHR). In [8], the authors designed PEKS integrated with ABAC to support multi-keyword search in multi-user settings. In [5], the expressive SE scheme in PEKS was studied and developed for outsourced PHRs.…”
Section: Related Workmentioning
confidence: 99%
“…In PHR datasets, changing privileges (i.e., user-permission assignments) are minimal [6], [7]. Since ABAC is the most suitable approach for these cases, protecting PHR data in the cloud by the means of attribute based keyword search over encrypted data is the most preferred choice of researchers [5], [8]- [10].…”
Section: Introductionmentioning
confidence: 99%