2014
DOI: 10.1186/preaccept-1025135849106903
|View full text |Cite
|
Sign up to set email alerts
|

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking

Abstract: With the advent of cloud computing, more and more information data are outsourced to the public cloud for economic savings and ease of access. However, the privacy information has to be encrypted to guarantee the security. To implement efficient data utilization, search over encrypted cloud data has been a great challenge. The existing solutions depended entirely on the submitted query keyword and didn't consider the semantics of keyword. Thus the search schemes are not intelligent and also omit some semantica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 16 publications
(40 reference statements)
0
9
0
Order By: Relevance
“…The server is in charge of searching over the encrypted data and retrieving related emails for the owners. More recent research works in searchable encryption (eg, other works 13,14,[18][19][20][21] ) describe their systems with similar elements to this work. We introduce these elements in greater detail in the rest of this section.…”
Section: Elements Of a Cloud-based Searchable Encryption Systemmentioning
confidence: 99%
See 4 more Smart Citations
“…The server is in charge of searching over the encrypted data and retrieving related emails for the owners. More recent research works in searchable encryption (eg, other works 13,14,[18][19][20][21] ) describe their systems with similar elements to this work. We introduce these elements in greater detail in the rest of this section.…”
Section: Elements Of a Cloud-based Searchable Encryption Systemmentioning
confidence: 99%
“…Trusted computing base (Gateway). Data owners and users in a searchable encryption system need data to be prepared and preprocessed (eg, removing stop words from the search query or extracting keywords from documents 21 ) on their local hardware before proceeding to the Cloud server. Preprocessing constructs another element in the searchable encryption system, termed Trusted computing base (or Gateway), 12,14,20 that includes the client-side application.…”
Section: Elements Of a Cloud-based Searchable Encryption Systemmentioning
confidence: 99%
See 3 more Smart Citations