2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2014
DOI: 10.1109/infcomw.2014.6849292
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical clustering method for big data oriented ciphertext search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 10 publications
0
22
0
Order By: Relevance
“…257 Hence, various researchers [27][28][29]43,50,55,70,75,[257][258][259] have incorporated the concept of result verification to searchable encryption. As an example, there may be a scenario where, during peak hours, the cloud server forwards incomplete or forged results to the end users.…”
Section: Support For Results Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…257 Hence, various researchers [27][28][29]43,50,55,70,75,[257][258][259] have incorporated the concept of result verification to searchable encryption. As an example, there may be a scenario where, during peak hours, the cloud server forwards incomplete or forged results to the end users.…”
Section: Support For Results Verificationmentioning
confidence: 99%
“…In the MRSE scheme 13 and its variants, 27,29,35,36,46,50,69,70,75,[80][81][82][83]93,107,[119][120][121]123,126 the query size is dependent on the number of keywords extracted from the document collection. In the MRSE scheme 13 and its variants, 27,29,35,36,46,50,69,70,75,[80][81][82][83]93,107,[119][120][121]123,126 the query size is dependent on the number of keywords extracted from the document collection.…”
Section: Rq4: How Is the Efficiency Of The Se Schemes Analyzed In Thementioning
confidence: 99%
“…[2][3][4][5][6][7]. As shown in Fig.1, the proposed method is compared with existing solutions and has the advantage in maintaining the relationship between documents.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, the orderpreserving strategies are applied to recognize the rank mechanism. Wang et al [3] use encrypted invert index to attain comfy ranked keyword seek over the encrypted files. In the quest segment, the cloud server computes the relevance rating among files and the question.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation