2014
DOI: 10.14257/ijsia.2014.8.3.02
|View full text |Cite
|
Sign up to set email alerts
|

Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data

Abstract: To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 20 publications
(40 citation statements)
references
References 20 publications
0
40
0
Order By: Relevance
“…Preprocessing constructs another element in the searchable encryption system, termed Trusted computing base (or Gateway), 12,14,20 that includes the client-side application. Data owners and users in a searchable encryption system need data to be prepared and preprocessed (eg, removing stop words from the search query or extracting keywords from documents 21 ) on their local hardware before proceeding to the Cloud server.…”
Section: Elements Of a Cloud-based Searchable Encryption Systemmentioning
confidence: 99%
See 4 more Smart Citations
“…Preprocessing constructs another element in the searchable encryption system, termed Trusted computing base (or Gateway), 12,14,20 that includes the client-side application. Data owners and users in a searchable encryption system need data to be prepared and preprocessed (eg, removing stop words from the search query or extracting keywords from documents 21 ) on their local hardware before proceeding to the Cloud server.…”
Section: Elements Of a Cloud-based Searchable Encryption Systemmentioning
confidence: 99%
“…The type of extracted data depends on the type of search system (eg, keyword search 35,36 versus semantic search 14,15 ). The type of extracted data depends on the type of search system (eg, keyword search 35,36 versus semantic search 14,15 ).…”
Section: Setup Mechanismmentioning
confidence: 99%
See 3 more Smart Citations