2016
DOI: 10.1109/tpds.2015.2506573
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
232
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 630 publications
(233 citation statements)
references
References 23 publications
0
232
0
1
Order By: Relevance
“…An encryption technique is often used to protect user privacy in the domain of information retrieval, e.g., encryption-based multi-keyword search scheme for personalized user preferences in [17], keyword vector encryption scheme for privacy-preserving information search over cloud data in [18], and encrypted semantic search based on conceptual graphs in clouding computing in [19]. However, encryption often introduces considerable computation cost and is hence not suitable for light-weight service recommendation.…”
Section: B Privacy Preservationmentioning
confidence: 99%
“…An encryption technique is often used to protect user privacy in the domain of information retrieval, e.g., encryption-based multi-keyword search scheme for personalized user preferences in [17], keyword vector encryption scheme for privacy-preserving information search over cloud data in [18], and encrypted semantic search based on conceptual graphs in clouding computing in [19]. However, encryption often introduces considerable computation cost and is hence not suitable for light-weight service recommendation.…”
Section: B Privacy Preservationmentioning
confidence: 99%
“…Next, as three popular criteria for evaluating a recommender system (e.g., in work [9]- [14]), the recommendation accuracy, recall and time cost are tested to validate the feasibility of our proposal. Concretely, accuracy is measured by MAE [15] (the smaller the better) in (8), where r target− j and r * target− j represent the real and predicted ratings of ws j by user target , respectively; RS denotes the recommended service set.…”
Section: Experiments Dataset and Deploymentmentioning
confidence: 99%
“…How to protect the security and privacy of wireless communications using mobile devices has been extensively considered by scholars. In order to achieve this goal, many encryption schemes (Fu Z et al [1,2]; Xia Z et al [3]; Huang X et al [4]), authentication schemes (Guo P et al [5]; Shen J et al [6]; Huang X et al [4,7];) and signature schemes (Ren Y et al [8]; Wang J et al [9]; Lee C C et al [10]) have been proposed in recent years. Mathematical Problems in Engineering receiver of the group cannot identify the identity of other receivers.…”
Section: Introductionmentioning
confidence: 99%