2014
DOI: 10.1109/tce.2014.7027353
|View full text |Cite
|
Sign up to set email alerts
|

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data

Abstract: With the increasing popularity of the pay-asyou-consume cloud computing paradigm, a large number of cloud services are pushed to consumers. One hand, it brings great convenience to consumers who use intelligent terminals; on the other hand, consumers are also facing serious difficulties that how to search the most suitable services or products from cloud. So how to enable a smart cloud search scheme is a critical problem in the consumer-centric cloud computing paradigm. For protecting data privacy, sensitive d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…In [7], the authors proposed a cost effective verifiable semantic search system based on keywords. The suggested system is more practical and versatile than most current searchable encoding systems and better suits distinct user query purposes.…”
Section: Related Workmentioning
confidence: 99%
“…In [7], the authors proposed a cost effective verifiable semantic search system based on keywords. The suggested system is more practical and versatile than most current searchable encoding systems and better suits distinct user query purposes.…”
Section: Related Workmentioning
confidence: 99%
“…There are also various studies towards data privacy. One of such study was discussed by Fu et al [26] who addressed the problem of sensitive data privacy. An encryption scheme for existing cloud search services is formulated in this work in order to further strengthen the cloud-based semantic system.…”
Section: Researches Performed On Big Data Securitymentioning
confidence: 99%
“…For example, some data related to the trade secrets of enterprises must be protected from being used illegally. As a result, the data is typically encrypted locally and then outsourced to a cloud storage server, which brings great trouble with the use of data [Fu, Shu and Sun (2014)]. Due to the limitation of network bandwidth and local storage capacity, it is impossible for users to download all the data and then decrypt it.…”
Section: Introductionmentioning
confidence: 99%