{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:27Z","timestamp":1740099147920,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_44","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T21:20:42Z","timestamp":1537478442000},"page":"484-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners"],"prefix":"10.1007","author":[{"given":"Cheng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Pengxu","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yingmo","family":"Jie","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"44_CR1","doi-asserted-by":"publisher","unstructured":"Liu, Y., Guo, W., Fan, C.-I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Ind. Inform. https:\/\/doi.org\/10.1109\/TII2018.2809672","DOI":"10.1109\/TII2018.2809672"},{"issue":"5","key":"44_CR2","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1049\/iet-ifs.2016.0103","volume":"11","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250\u2013255 (2017)","journal-title":"IET Inf. Secur."},{"key":"44_CR3","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy, pp. 44\u201355 (2000)"},{"key":"44_CR4","unstructured":"Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive, 216 (2013)"},{"key":"44_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_30"},{"issue":"5","key":"44_CR6","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"key":"44_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"44_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Applied Cryptography and Network Security","author":"P Golle","year":"2004","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31\u201345. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24852-1_3"},{"key":"44_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/11602897_35","volume-title":"Information and Communications Security","author":"L Ballard","year":"2005","unstructured":"Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414\u2013426. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11602897_35"},{"key":"44_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_29"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Shi, E., Bethencourt, J., Chan, T.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: Security and Privacy, pp. 350\u2013364 (2007)","DOI":"10.1109\/SP.2007.29"},{"issue":"11","key":"44_CR12","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s10916-016-0588-0","volume":"40","author":"C Guo","year":"2016","unstructured":"Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.K.R.: Fine-grained database field search using attribute-based encryption for E-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)","journal-title":"J. Med. Syst."},{"key":"44_CR13","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM, pp. 829\u2013837 (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"issue":"1","key":"44_CR14","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"44_CR15","doi-asserted-by":"crossref","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","volume":"25","author":"W Sun","year":"2014","unstructured":"Sun, W., et al.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025\u20133035 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"44_CR16","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: 6th International Conference on Cloud Computing. LNCS, vol. 8201, pp. 390\u2013397. (2013)","DOI":"10.1109\/CLOUD.2013.18"},{"issue":"3","key":"44_CR18","first-page":"453","volume":"16","author":"ZJ Fu","year":"2015","unstructured":"Fu, Z.J., Shu, J.G., Wang, J., Liu, Y.L., Lee, S.Y.: Privacy-preserving smart similarity search based on simhash over encrypted data in cloud computing. J. Internet Technol. 16(3), 453\u2013460 (2015)","journal-title":"J. Internet Technol."},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Tao, Y., Yi, K., Sheng, C., Kalnis, P.: Quality and efficiency in high dimensional nearest neighbor search. In: ACM SIGMOD International Conference on Management of Data, pp. 563\u2013576 (2009)","DOI":"10.1145\/1559845.1559905"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: IEEE International Conference on Computer Communications, pp. 451\u2013459 (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-Nearest neighbor query over encrypted data in outsourced environments. In: IEEE ICDE, pp. 664\u2013675 (2014)","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"44_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-319-24177-7_3","volume-title":"Computer Security \u2013 ESORICS 2015","author":"X Yuan","year":"2015","unstructured":"Yuan, X., Cui, H., Wang, X., Wang, C.: Enabling privacy-assured similarity retrieval over millions of encrypted records. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 40\u201360. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_3"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Wang, B., Hou, Y., Li, M.: Practical and secure nearest neighbor search on encrypted large-scale data. In: IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524389"},{"key":"44_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: IEEE Symposium on Security and Privacy, pp. 463\u2013477 (2013)","DOI":"10.1109\/SP.2013.38"},{"key":"44_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, W., Xiao, Y., Lin, Y., Zhou, T., Zhou, S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. In: 44th Annual IEEE\/IFIP International Conference on Dependable System and Networks, Atlanta, USA, pp. 276\u2013286 (2014)","DOI":"10.1109\/DSN.2014.36"},{"issue":"5","key":"44_CR27","doi-asserted-by":"crossref","first-page":"1566","DOI":"10.1109\/TC.2015.2448099","volume":"65","author":"W Zhang","year":"2015","unstructured":"Zhang, W., Lin, Y., Xiao, S., Wu, J., Zhou, S.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566\u20131577 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"44_CR28","doi-asserted-by":"crossref","unstructured":"Cui, H., Yuan, X., Zheng, Y., Wang, C.: Enabling secure and effective near-duplicate detection over encrypted in-network storage. In: IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524346"},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: 20th Symposium on Computational Geometry, pp. 253\u2013262 (2004)","DOI":"10.1145\/997817.997857"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T06:07:24Z","timestamp":1662098844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}