{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:13:01Z","timestamp":1746159181109,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":50,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_9","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"189-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Wenhai","family":"Sun","sequence":"first","affiliation":[]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"9_CR1","unstructured":"Keyword and search engines statistics. http:\/\/www.keyworddiscovery.com\/keyword-stats.html?date=2013-01-01 (2013)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48\u201359. ACM (2010)","DOI":"10.1145\/1755688.1755695"},{"issue":"4","key":"9_CR3","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10207-005-0070-3","volume":"4","author":"M.J. Atallah","year":"2005","unstructured":"Atallah, M.J., Li, J.: Secure outsourcing of sequence comparisons. International Journal of Information Security 4(4), 277\u2013287 (2005)","journal-title":"International Journal of Information Security"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., Libert, B.: Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. In: Public Key Cryptography\u2013PKC 2010, pp. 384\u2013402. Springer (2010)","DOI":"10.1007\/978-3-642-13013-7_23"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Zhang, X.: Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 375\u2013388. ACM (2011)","DOI":"10.1145\/2046707.2046752"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Information Security Practice and Experience, pp. 71\u201385. Springer (2008)","DOI":"10.1007\/978-3-540-79104-1_6"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di\u00a0Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-Eurocrypt 2004, pp. 506\u2013522. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Advances in Cryptology \u2013 CRYPTO 2001, pp. 213\u2013229. Springer (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th conference on Theory of cryptography, pp. 535\u2013554. Springer-Verlag (2007)","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829\u2013837 (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 442\u2013455. Springer (2005)","DOI":"10.1007\/11496137_30"},{"issue":"6","key":"9_CR12","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of the ACM 45(6), 965\u2013981 (1998)","journal-title":"Journal of the ACM"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Chuah, M., Hu, W.: Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on, pp. 273\u2013281. IEEE (2011)","DOI":"10.1109\/ICDCSW.2011.11"},{"issue":"2","key":"9_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/356770.356776","volume":"11","author":"D. Comer","year":"1979","unstructured":"Comer, D.: Ubiquitous b-tree. ACM computing surveys 11(2), 121\u2013137 (1979)","journal-title":"ACM computing surveys"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"9_CR17","unstructured":"Goh, E.J.: Secure indexes. Cryptology ePrint Archive. http:\/\/eprint.iacr.org\/2003\/216 (2003)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: ACNS 04: 2nd International Conference on Applied Cryptography and Network Security, pp.\u00a031\u201345. Springer-Verlag (2004)","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Theory of Cryptography, pp. 264\u2013282. Springer (2005)","DOI":"10.1007\/978-3-540-30576-7_15"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Pairing-Based Cryptography\u2013Pairing 2007, pp. 2\u201322. Springer (2007)","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Cryptography from anonymity. In: the 47th Annual IEEE Symposium on Foundations of Computer Science, pp. 239\u2013248. IEEE (2006)","DOI":"10.1109\/FOCS.2006.25"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp.\u00a0965\u2013976. ACM (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Advances in Cryptology\u2013EUROCRYPT 2008, pp. 146\u2013162. Springer (2008)","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Keller, E., Szefer, J., Rexford, J., Lee, R.B.: Nohype: virtualized cloud infrastructure without the virtualization. In: ACM SIGARCH Computer Architecture News, vol.\u00a038, pp. 350\u2013361. ACM (2010)","DOI":"10.1145\/1816038.1816010"},{"key":"9_CR25","unstructured":"Krebs, B.: Payment processor breach may be largest ever. http:\/\/voices.washingtonpost.com\/securityfix\/2009\/01\/payment_processor_breach_may_b.html (2009)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Cao, N., Lou, W.: Authorized private keyword search over encrypted data in cloud computing. In: Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pp. 383\u2013392. IEEE (2011)","DOI":"10.1109\/ICDCS.2011.55"},{"issue":"1","key":"9_CR28","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M. Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems 24(1), 131\u2013143 (2013)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Liu, C., Zhu, L., Li, L., Tan, Y.: Fuzzy keyword search on encrypted cloud storage data with small index. In: Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on, pp. 269\u2013273. IEEE (2011)","DOI":"10.1109\/CCIS.2011.6045073"},{"key":"9_CR30","unstructured":"Lu, Y.: Privacy-preserving logarithmic-time search on encrypted data in cloud. In: 19th Annual Network and Distributed System Security Symposium (NDSS Symposium\u201912) (2012)"},{"key":"9_CR31","unstructured":"NIST: NIST\u2019s dictionary of algorithms and data structures: inverted index. http:\/\/xlinux.nist.gov\/dads\/HTML\/invertedIndex.html"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Ondrei\u010dka, M., Pokorn\u1ef3, J.: Extending fagin\u2019s algorithm for more users based on multidimensional b-tree. In: Advances in Databases and Information Systems, pp. 199\u2013214. Springer (2008)","DOI":"10.1007\/978-3-540-85713-6_15"},{"issue":"2","key":"9_CR33","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/0306-4379(82)90024-2","volume":"7","author":"P. Scheuermann","year":"1982","unstructured":"Scheuermann, P., Ouksel, M.: Multidimensional b-trees for associative searching in database systems. Information systems 7(2), 123\u2013137 (1982)","journal-title":"Information systems"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Theory of Cryptography, pp. 457\u2013473. Springer (2009)","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"9_CR35","unstructured":"Sheridan, J., Cooper, C.: Defending the cloud. http:\/\/www.reactionpenetrationtesting.co.uk\/Defending%20the%20Cloud%20v1.0.pdf (2012)"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Shi, E., Bethencourt, J., Chan, H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 350\u2013364 (2007)","DOI":"10.1109\/SP.2007.29"},{"key":"9_CR37","unstructured":"Slocum, Z.: Your google docs: Soon in search results? http:\/\/news.cnet.com\/8301-17939_109-1035713%207-2.html (2009)"},{"key":"9_CR38","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44\u201355 (2000)"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp.\u00a071\u201382. ACM (2013)","DOI":"10.1145\/2484313.2484322"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Mao, Y., Su, G.M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W.: Confidentiality-preserving rank-ordered search. In: Proceedings of the 2007 ACM Workshop on Storage Security and Survivability, pp. 7\u201312 (2007)","DOI":"10.1145\/1314313.1314316"},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 401\u2013412. ACM (2011)","DOI":"10.1145\/2046707.2046754"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Van\u00a0Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Secure Data Management, pp. 87\u2013100. Springer (2010)","DOI":"10.1007\/978-3-642-15546-8_7"},{"issue":"8","key":"9_CR43","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C. Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems 23(8), 1467\u20131479 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: INFOCOM, 2011 Proceedings IEEE, pp. 820\u2013828. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5935305"},{"key":"9_CR45","volume-title":"Managing gigabytes: Compressing and indexing documents and images","author":"I.H. Witten","year":"1999","unstructured":"Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: Compressing and indexing documents and images. Morgan Kaufmann Publishing, San Francisco, May 1999"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.l., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139\u2013152. ACM (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, pp. 264\u2013271. IEEE (2011)","DOI":"10.1109\/CloudCom.2011.43"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber+ r: Top-k retrieval from a confidential index. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 439\u2013449. ACM (2009)","DOI":"10.1145\/1516360.1516412"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, N., Li, M., Lou, W., Hou, Y.T.: Mushi: Toward multiple level security cloud with strong hardware level isolation. In: MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012, pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/MILCOM.2012.6415698"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:50:54Z","timestamp":1746118254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_9","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}