2019
DOI: 10.1109/tsc.2016.2622697
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 125 publications
(36 citation statements)
references
References 30 publications
0
36
0
Order By: Relevance
“…An encryption technique is often used to protect user privacy in the domain of information retrieval, e.g., encryption-based multi-keyword search scheme for personalized user preferences in [17], keyword vector encryption scheme for privacy-preserving information search over cloud data in [18], and encrypted semantic search based on conceptual graphs in clouding computing in [19]. However, encryption often introduces considerable computation cost and is hence not suitable for light-weight service recommendation.…”
Section: B Privacy Preservationmentioning
confidence: 99%
“…An encryption technique is often used to protect user privacy in the domain of information retrieval, e.g., encryption-based multi-keyword search scheme for personalized user preferences in [17], keyword vector encryption scheme for privacy-preserving information search over cloud data in [18], and encrypted semantic search based on conceptual graphs in clouding computing in [19]. However, encryption often introduces considerable computation cost and is hence not suitable for light-weight service recommendation.…”
Section: B Privacy Preservationmentioning
confidence: 99%
“…Likewise, we can calculate the similarities between target services (i.e., ws 1 and ws 2 ) and other services (i.e., ws 3 , ws 4 , ws 5 , ws 6 ), respectively. Concretely, Sim(ws 1 , ws 3 ) = Sim(ws 1 , ws 4 ) = Sim(ws 2 , ws 3 ) = Sim(ws 2 , ws 4 ) = 0, while Sim(ws 1 , ws 5 ) = Sim(ws 1 , ws 6 ) = Sim(ws 2 , ws 5 ) = Sim(ws 2 , ws 6 ) = Null.…”
Section: Motivationmentioning
confidence: 99%
“…With the ever-increasing popularity of SOA (Service Oriented Architecture), many enterprises or organizations turn to encapsulate their complex business processes into lightweight and easy-to-access web services, which significantly facilitate the construction of complex serviceoriented business applications of various users [1]- [3].…”
Section: Introductionmentioning
confidence: 99%
“…A secure multikeyword ranked search scheme was presented by Xia et al with a "Greedy Depthfirst Search" algorithm, which can be applied on encrypted data before outsourcing for privacy purpose [23]. In [24], a content-based scheme was designed to solve the problems of semantic search based on conceptual graphs over the encrypted data. Fu et al also proposed an applicable and extensible search scheme, which could support multikeyword ranked search in parallel computing with privacy-preserving approach [25].…”
Section: Introductionmentioning
confidence: 99%