2016
DOI: 10.1109/tifs.2016.2596138
|View full text |Cite
|
Sign up to set email alerts
|

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
183
0
2

Year Published

2017
2017
2020
2020

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 478 publications
(185 citation statements)
references
References 26 publications
0
183
0
2
Order By: Relevance
“…Locality-sensitive hashing (LSH) was introduced by Aristides Gionis in 1999 [20] and has been proven to be an effective approach for approximate nearest neighbor (ANN) search, such as the LSH-based privacy-preserving image content and feature protection approach in [21] and the LSHbased multi-keyword fuzzy search approach over encrypted outsourced data in [22]. The main idea of LSH is as follows: select a hashing function (or a hashing function family) such that (1) two neighboring points in the original data space are still neighbors after hashing with high probability and (2) two non-neighboring points in the original data space are still not neighbors after hashing with high probability.…”
Section: A Locality-sensitive Hashingmentioning
confidence: 99%
“…Locality-sensitive hashing (LSH) was introduced by Aristides Gionis in 1999 [20] and has been proven to be an effective approach for approximate nearest neighbor (ANN) search, such as the LSH-based privacy-preserving image content and feature protection approach in [21] and the LSHbased multi-keyword fuzzy search approach over encrypted outsourced data in [22]. The main idea of LSH is as follows: select a hashing function (or a hashing function family) such that (1) two neighboring points in the original data space are still neighbors after hashing with high probability and (2) two non-neighboring points in the original data space are still not neighbors after hashing with high probability.…”
Section: A Locality-sensitive Hashingmentioning
confidence: 99%
“…However, the "average" idea often leads to low recommendation performance. In [10], a core user-based recommendation approach core-users-NBI is put forward, which utilizes the core users in social network for recommendation; however, no threshold is posed on user similarity and hence, the recommended results are not accurate enough.…”
Section: Related Work and Comparison Analysesmentioning
confidence: 99%
“…They also support single user architecture [11] and multi-user architecture [10]. In addition, works done to support single keyword search [11], [13], multi-keyword search and ranking [3], [14], [15], subset query and range query [16], [17] and fuzzy multi-keyword search [18], [19]. Most of the previous work done on SE to improve secrecy motivated by adversary activity [20], [21].…”
Section: Searchable Encryption (Se)mentioning
confidence: 99%