2017
DOI: 10.1007/s11042-017-5055-5
|View full text |Cite
|
Sign up to set email alerts
|

Split keyword fuzzy and synonym search over encrypted cloud data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…So the scheme ensures that content other than access and search requests are not compromised. This section will prove that the fuzzy search scheme designed in this paper is in line with the non-adaptive semantic security requirements [Raghavendra, Girish and Geeta (2018)]. The non-adaptive attack model only considers adversaries (e.g., cloud servers), who cannot select trapdoor-based search requests and previous search results, because only users with authorized private keys can generate search traps [Wang, Chen, Li et al (2017); Shen, Wang, Li et al (2018)].…”
Section: Security Analysismentioning
confidence: 82%
“…So the scheme ensures that content other than access and search requests are not compromised. This section will prove that the fuzzy search scheme designed in this paper is in line with the non-adaptive semantic security requirements [Raghavendra, Girish and Geeta (2018)]. The non-adaptive attack model only considers adversaries (e.g., cloud servers), who cannot select trapdoor-based search requests and previous search results, because only users with authorized private keys can generate search traps [Wang, Chen, Li et al (2017); Shen, Wang, Li et al (2018)].…”
Section: Security Analysismentioning
confidence: 82%
“…The relevance score is computed in the client side, so sensitive information of the data owner can be access by the unauthorized users. In [14] an efficient search result approach is proposed based on the split keyword fuzzy and synonym search. The wildcard technique is used in this process to store the keyword in index safely.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, simulation results obtained from the implementation is compared with the existing method discussed in papers RGMTS [11], IVCKSE [12] and SKFS [14]. Three performance metrics are considered to compare the proposed work with existing work.…”
Section: B Comparative Analysismentioning
confidence: 99%
“…The concept of similarity search (Zezula et al, 2006) (Raghavendra et al, 2015) is applicable to a wide range of data and infinite number of various similarity functions. The time series pattern which has been collected in hourly or weekly basis can be searched by the scientist for similar patterns to indicate an interesting phenomenon.…”
Section: Introductionmentioning
confidence: 99%