2018
DOI: 10.1109/tifs.2018.2819121
|View full text |Cite
|
Sign up to set email alerts
|

Semantic-Aware Searching Over Encrypted Data for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 72 publications
(33 citation statements)
references
References 51 publications
0
33
0
Order By: Relevance
“…Fu et al [27] used the concept map to implement the semantic search of encrypted data. Fu et al [28], [29] proposed a content-based search scheme that implements an effective search for semantic perception on encrypted data.…”
Section: Semantic Searchmentioning
confidence: 99%
See 1 more Smart Citation
“…Fu et al [27] used the concept map to implement the semantic search of encrypted data. Fu et al [28], [29] proposed a content-based search scheme that implements an effective search for semantic perception on encrypted data.…”
Section: Semantic Searchmentioning
confidence: 99%
“…Therefore, the document collection and index need to be encrypted before uploading to the public cloud server, and should prevent the statistical analysis of the public cloud server. Additionally, we assume that there is no collusion between two cloud servers, which is adopted by most previous works [28], [35]. Our paper mainly discusses the known ciphertext model, in which the public cloud server can only obtain ciphertexts, security indexes, search results, and trapdoor.…”
Section: A Threat Modelmentioning
confidence: 99%
“…Since then, many variants were proposed by adapting the index structure presented by Curtmola et al and Cash and Kamara or inventing new ones. There are schemes that provide richer functionalities, such as Boolean search [27], dynamic Boolean search [28], ranked search [29], [30] as well as semantic-aware scheme [31]. There are also schemes providing better security with less leakage and forward privacy [32], hide access pattern using private information retrieval in a two-server setting for large-scale database [33], as well as efficient blind storage where the server acts only as a commodity server offering only upload and download services [34].…”
Section: Queries On Encrypted Datamentioning
confidence: 99%
“…Fu et al [Fu, Wu and Wang (2017)] improved accuracy by using center word expansion. Fu et al [Fu, Xia and Sun (2018)] proposed the conceptual hierarchical semantic search scheme under dual servers. Fig.…”
Section: Semantic Searchmentioning
confidence: 99%