2014
DOI: 10.1186/s13677-014-0008-2
|View full text |Cite
|
Sign up to set email alerts
|

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking

Abstract: With the advent of cloud computing, more and more information data are outsourced to the public cloud for economic savings and ease of access. However, the privacy information has to be encrypted to guarantee the security. To implement efficient data utilization, search over encrypted cloud data has been a great challenge. The existing solutions depended entirely on the submitted query keyword and didn't consider the semantics of keyword. Thus the search schemes are not intelligent and also omit some semantica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(38 citation statements)
references
References 19 publications
0
38
0
Order By: Relevance
“…13,21,27 Then, the encrypted Trapdoor is sent to the cloud server. This process is used by data users to form search queries.…”
Section: Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…13,21,27 Then, the encrypted Trapdoor is sent to the cloud server. This process is used by data users to form search queries.…”
Section: Overviewmentioning
confidence: 99%
“…14,15,21,35 The Index structure is also known as ''meta data'' 18 or ''identify keywords.'' 14,15,21,35 The Index structure is also known as ''meta data'' 18 or ''identify keywords.''…”
Section: Setup Mechanismmentioning
confidence: 99%
See 2 more Smart Citations
“…Term association based terms selection methods, such as Mutual Information [3] and Co-occurrence Information [2,4] estimate the goodness of each term based on the occurrence of terms in feedback documents (term pool). Corpus statistics based query expansion term selection methods, such as Chi-Square Statistic [5,6], Binary Independence Model [7] and Robertson Selection Value [8] estimate the goodness of each term based on the distribution of terms across the corpus and using the query term information present in feedback documents.…”
Section: Introductionmentioning
confidence: 99%